Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-1385 (GCVE-0-2009-1385)
Vulnerability from cvelistv5
- n/a
 
{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:13:25.510Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "35265",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35265"
          },
          {
            "name": "MDVSA-2009:135",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:135"
          },
          {
            "name": "DSA-1865",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1865"
          },
          {
            "name": "20100625 VMSA-2010-0010 ESX 3.5 third party update for Service Console kernel",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/512019/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0111"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/project/shownotes.php?release_id=504022\u0026group_id=42302"
          },
          {
            "name": "36131",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36131"
          },
          {
            "name": "FEDORA-2009-6883",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html"
          },
          {
            "name": "FEDORA-2009-6768",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html"
          },
          {
            "name": "37471",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37471"
          },
          {
            "name": "MDVSA-2009:148",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:148"
          },
          {
            "name": "35656",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35656"
          },
          {
            "name": "DSA-1844",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1844"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
          },
          {
            "name": "RHSA-2009:1193",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2009-1193.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.intel.com/support/network/sb/CS-030543.htm"
          },
          {
            "name": "35566",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35566"
          },
          {
            "name": "54892",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/54892"
          },
          {
            "name": "oval:org.mitre.oval:def:11598",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11598"
          },
          {
            "name": "RHSA-2009:1157",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2009-1157.html"
          },
          {
            "name": "35185",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/35185"
          },
          {
            "name": "20090724 rPSA-2009-0111-1 kernel",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/505254/100/0/threaded"
          },
          {
            "name": "35623",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35623"
          },
          {
            "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
          },
          {
            "name": "36051",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36051"
          },
          {
            "name": "36327",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36327"
          },
          {
            "name": "USN-793-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-793-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
          },
          {
            "name": "[oss-security] 20090603 CVE-2009-1385 kernel: e1000_clean_rx_irq() denial of service",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/06/03/2"
          },
          {
            "name": "oval:org.mitre.oval:def:11681",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11681"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc8"
          },
          {
            "name": "RHSA-2009:1550",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://rhn.redhat.com/errata/RHSA-2009-1550.html"
          },
          {
            "name": "oval:org.mitre.oval:def:8340",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8340"
          },
          {
            "name": "FEDORA-2009-6846",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea30e11970a96cfe5e32c03a29332554573b4a10"
          },
          {
            "name": "SUSE-SA:2009:038",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html"
          },
          {
            "name": "ADV-2009-3316",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3316"
          },
          {
            "name": "35847",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35847"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-06-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "35265",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35265"
        },
        {
          "name": "MDVSA-2009:135",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:135"
        },
        {
          "name": "DSA-1865",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1865"
        },
        {
          "name": "20100625 VMSA-2010-0010 ESX 3.5 third party update for Service Console kernel",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/512019/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0111"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/project/shownotes.php?release_id=504022\u0026group_id=42302"
        },
        {
          "name": "36131",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36131"
        },
        {
          "name": "FEDORA-2009-6883",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html"
        },
        {
          "name": "FEDORA-2009-6768",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html"
        },
        {
          "name": "37471",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37471"
        },
        {
          "name": "MDVSA-2009:148",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:148"
        },
        {
          "name": "35656",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35656"
        },
        {
          "name": "DSA-1844",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1844"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
        },
        {
          "name": "RHSA-2009:1193",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2009-1193.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.intel.com/support/network/sb/CS-030543.htm"
        },
        {
          "name": "35566",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35566"
        },
        {
          "name": "54892",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/54892"
        },
        {
          "name": "oval:org.mitre.oval:def:11598",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11598"
        },
        {
          "name": "RHSA-2009:1157",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2009-1157.html"
        },
        {
          "name": "35185",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/35185"
        },
        {
          "name": "20090724 rPSA-2009-0111-1 kernel",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/505254/100/0/threaded"
        },
        {
          "name": "35623",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35623"
        },
        {
          "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
        },
        {
          "name": "36051",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36051"
        },
        {
          "name": "36327",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36327"
        },
        {
          "name": "USN-793-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-793-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
        },
        {
          "name": "[oss-security] 20090603 CVE-2009-1385 kernel: e1000_clean_rx_irq() denial of service",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/06/03/2"
        },
        {
          "name": "oval:org.mitre.oval:def:11681",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11681"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc8"
        },
        {
          "name": "RHSA-2009:1550",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://rhn.redhat.com/errata/RHSA-2009-1550.html"
        },
        {
          "name": "oval:org.mitre.oval:def:8340",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8340"
        },
        {
          "name": "FEDORA-2009-6846",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea30e11970a96cfe5e32c03a29332554573b4a10"
        },
        {
          "name": "SUSE-SA:2009:038",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html"
        },
        {
          "name": "ADV-2009-3316",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3316"
        },
        {
          "name": "35847",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35847"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2009-1385",
    "datePublished": "2009-06-04T16:00:00",
    "dateReserved": "2009-04-23T00:00:00",
    "dateUpdated": "2024-08-07T05:13:25.510Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2009-1385\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2009-06-04T16:30:00.297\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento inferior de entero en la funci\u00f3n 1000_clean_rx_irq en drivers/net/e1000/e1000_main.c en el controlador e1000 en Linux kernel anterior a v2.6.30-rc8, el controlador e1000e en el kernel de Linux, y Intel Wired Ethernet (tambi\u00e9n conocido como e1000) anteriores a v7.5.5 permite a los atacantes remotos causar una denegaci\u00f3n de servicios (panic) a trav\u00e9s de un tama\u00f1o de marco manipulado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:e1000:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.4.35\",\"matchCriteriaId\":\"5D5A3319-0284-4AD3-90C1-51A5B1DEC589\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:e1000:5.2.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8F900E9-03F9-4300-827C-30D5FCB05C4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:e1000:5.2.30.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE4EDE6D-A095-48B3-BE17-E0E736875944\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:e1000:5.2.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"931C9D7B-9E51-4D15-8B08-2AFDADAF938B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:e1000:5.3.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47D7EBDF-CC20-4EAE-93A8-1F69EC3DFE75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:e1000:5.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7003DA69-4ACA-4C83-B223-021FE59FFB2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:e1000:5.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44C0CB29-E22E-4866-A5FC-8BFF030451B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:e1000:5.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"895280E8-958D-4F03-865D-E7F9F11162E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:e1000:5.6.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2671C674-18DE-4A94-9E0D-C40CD3AE2141\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:e1000:5.7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"818FDED7-7BB0-491E-856F-8795ABB683AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:e1000:6.0.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C7240F-6FB6-44A4-802B-81ECCE038312\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:e1000:6.0.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3A86028-EAB0-462D-97D4-9DF00148B4FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:e1000:6.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2451466-AB8B-4E64-B25B-CF7801B24F2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:e1000:6.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BBA12ED-F5FB-4CD0-A098-88DBCE2E11F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:e1000:6.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62FC547B-9EE1-4A1E-969C-A8A3D0B487D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:e1000:7.0.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FC19339-25C7-4A88-BF12-194AA67E81A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:e1000:7.0.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B878098A-958E-412C-BCB6-6F5BDBBBD5DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:e1000:7.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E25EC32-DF88-42AE-B36C-1B1CAC607EAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:e1000:7.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"799672BF-A7EC-426D-8A44-183312B962C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:e1000:7.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA010350-3589-44CA-867E-D709D2E044FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:e1000:7.3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72E2BF5D-283C-44DF-8044-B25AF793BDE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:e1000:7.3.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38F81628-D03C-4646-8BD0-229DF0392E5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:e1000:7.4.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAE0F106-5017-4D0B-9824-53708D59D3C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linux:kernel:2.6.24.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1760FDC9-BB79-4299-8A6D-482085EE5BD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linux:kernel:2.6.25.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56EEB157-5037-4EAD-8625-35B91B167111\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6.28\",\"matchCriteriaId\":\"9B5B312F-E76A-43E1-A73F-31535848D55B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:rc7-git6:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6.30\",\"matchCriteriaId\":\"FBD48C54-738D-4559-A43C-A37F80CB5640\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43F9DBB0-8AF7-42CA-95DD-68A344E9D549\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA39D4CE-22F0-46A2-B8CF-4599675E7D3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDD00664-A27C-4514-A2A4-079E8F9B0251\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E336C792-B7A1-4318-8050-DE9F03474CEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7228AE50-BACB-4AB8-9CE5-17DB0CD661AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6D260FD-E55E-4A95-AB7F-B880DBE37BAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E36D0159-1A05-4628-9C1C-360DED0F438C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E6654B9-42EB-4C2C-8F71-710D50556180\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FC560CC-F785-42D5-A25B-1BA02E7AC464\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C06F0037-DE20-4B4A-977F-BFCFAB026517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1817C772-D367-4ABE-B835-466D31A6DC89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C667B8E4-64EB-4A05-84FF-B2243DEF757D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9484B41A-DFB6-4481-80D8-440C711CEA53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D373AF-DE6B-428E-9F0F-F1D220900A4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2975DF7-F916-456C-BF7C-2694559E5282\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"784EB96E-2FD3-4F77-8DB6-4D6C7A928946\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86A98A70-51E3-4556-8DC4-DD09CF370D1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"469EE3B0-3CC2-4AC2-86A0-2DF34205E707\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCFECB2B-6482-45F2-B3BB-EDDEDA0948A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EC547EB-9308-4477-8256-A0E04B42D6DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F55A024-9F8E-44F8-A0D8-696BC232524A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84595143-3B04-4CE8-81C0-28EEEC58CD0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32EE2B49-DDEB-4B49-A5F0-CAA161095A5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3ABFA33-8FA1-488E-A9BD-1593F495F595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62F6DE3A-E6CC-4D7E-BD08-E43DC4182200\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9A29C44-EBE5-42B0-AFAD-C5A8F6EEF2F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96A43C95-8569-40BE-9E5B-F9B3D0B9D188\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABD70B2B-9827-4DBB-B82D-0B70C2D4AB1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99662904-E5E3-4E81-B199-39707EAEB652\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615BDD1D-36AA-4976-909B-F0F66BF1090C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE8A26D6-1BDA-45F0-8F7C-F95986050E32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61A3EDF2-09D7-4116-AE46-D86E4B9602AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A55028-B8F9-4AD2-AE57-A80D561F3C79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C4E641C-67D4-4599-8EFB-0B2F8D81D68C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70460F6C-D6C0-4C1A-B13E-368705EAF223\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F26BA18-08AD-45FE-9F83-25CCB2E27270\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EBFF148-3EDA-4216-910B-8930D8C443C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"648C63F7-EA1D-4F2E-B8AF-1F380C83E542\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1697B855-4834-4633-A5C8-C1F7F13ACE0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FBAE75F-9145-4B9A-A6D8-E488C5326145\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5990C6C2-2F66-4C4D-8224-74163865F410\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A45A9B9-4B19-4A5B-BC95-BCBC4EF00F12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C23AD176-3B99-4593-BCBD-13C1E579A13E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"034DFD7F-8919-4245-8480-7B272F591271\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CEBC606-6488-48CE-8AA8-5B8CC724D5D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A83C60AF-50A9-480E-860D-45E80AC0A6B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22_rc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44FDF616-E410-4540-B377-98D1FB88CE35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22_rc7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5313B736-9904-442A-84D6-8FC7B9AC2059\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE87D1BC-A72D-42D2-A93C-67A5823BEB14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AAC2E9D-0E82-4866-9046-ADD448418198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"760FB32D-9795-4B29-B79A-A32B5E70F7EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DFF67E9-B0C2-48D5-BB3A-CF21D10010FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5881A78C-D162-4DE5-8353-2BB1EC1F428B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B13D81D2-1A89-4E61-A90C-5E8BB880310B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F9887E-2466-4C73-A8E1-2117492F9EC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FDE5B27-2EF0-464E-8F14-5E809D84D389\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"815B2EE8-136F-44E4-997D-5F93A54775DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23_rc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76D0AFF0-8CA9-42EF-A20E-3CD6E7DDF016\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13673DF5-09B1-40C8-AC54-A447DE8AB01E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52152F5A-1833-4490-A373-9C547B90B0F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B64A095E-5E97-445E-B435-F09983CC0E7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8035F93-9DEE-4B92-ABAA-4ABE0B71BF41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EE92406-DBF3-463E-8A51-F9679E851FDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C60D19B-ED9B-443C-9D49-002ABD381119\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"264C61EE-64F6-43AD-B54F-7D683C29E64F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24_rc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3069324C-28FB-4BB6-9451-F3AC6A8DA64C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24_rc4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F3D19AD-4268-45E7-B13D-BC93ABDF2226\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24_rc5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67E619E6-A515-43BC-B371-C1FF6DAA6CCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71295664-89EC-4BB3-9F86-B1DDA20FAC5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"6ED1BAE4-A6D3-49A1-BCAD-1E514D42F609\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37BE853A-BA6F-4A70-B166-E34441F0B7DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"4F7C4DFF-616C-497D-9BAB-67C2E21BC21D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85064FDF-4B62-43BF-B36C-F659D739BC22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"E6EBBFE8-2332-45CE-93F8-6815C2AE5D17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEADC505-FF44-4D45-8EA6-B23A1C4564D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"388414A1-C9B4-41BA-AD35-6501A463A095\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CE3C807-5C9B-4B71-868B-DF17ECB1514F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"FDBA01DD-C129-48F1-800B-838418F4A4A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6CADAA2-91D2-40C4-90F3-D7F40A3D4CB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"185F1EF8-04EB-43ED-B909-8BDF60F23E76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45B6847C-873B-4BE1-852D-239115E59BA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"D9D4BCAD-B3CD-4FA1-A833-0D7D40289E07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF41209E-D27F-4642-A405-90E822A41897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"3483FAFA-353C-498F-AF68-8F5B84A0F30D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97F59FD9-46E5-4F63-80A0-091AD44D1867\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"B3D5AEA5-210B-4E9F-8D9C-C25B84F15C75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"428844A5-E020-4AE9-8012-9AEDFCB7C32E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"6B11A9E1-9D90-46DC-81B5-17A137205AB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94C9D70D-A552-48D6-9497-EE07EB5649D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"07EEC559-9240-46BE-9057-0F17D1F61F99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF6169FF-9FF9-4A81-BAEB-6D5132F64F61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"BBBC127F-D67E-43FE-BCFE-606C200084F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6DC79CF-A504-4232-9F66-B5DCD0213DA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"42B18945-EE09-4E6B-8C11-E382E5F8F850\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"192B4273-0935-4232-BBFD-A850855CAC5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60E9FDA8-7EC3-4B9B-B508-27F948D60DDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A16F2182-C489-4CA9-A56B-01463148D16F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"630A56D3-7A82-44DE-8888-2EB8CD1C24A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E45F4429-5A9C-4E8B-96EE-CCF19776CABF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EFCAF09-BB20-424C-8648-014C0F71F8A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A74970C-5EEA-47A7-A62D-AF98F4D1228F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEA56669-B09E-42C2-9591-245C46909A2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9B33D60-8023-4A0B-ACF7-9F811EEB8BCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D08D180-23F7-456F-98CA-26B53C678D76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"856FE78A-29B5-4411-98A0-4B0281C17EB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C386B13F-9D7C-45F8-B86A-886384144A8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:git1:*:*:*:*:*:*\",\"matchCriteriaId\":\"32F95AB2-319C-4BDE-8D34-9FBE69A2FB6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D48FD9D7-E775-4E26-AEBF-01A09C404D6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"89EA3CF3-0AB7-4648-96BA-25E978D2C8C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:rc2_git7:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E4DB179-F78F-4D36-A47D-557FB1B945DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29:rc8-kk:*:*:*:*:*:*\",\"matchCriteriaId\":\"23859759-4748-4A03-9D78-083C77CFF4AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A701E87D-B807-426E-9CD4-6721DBCABE19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29.rc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D5FC0A9-A78A-4D09-BDCC-208AFC899824\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29.rc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DBFC9DD-B7C2-4FB2-A8F6-29FF50EFAAE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.29.rc2-git1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54B3BFC1-4B0A-4D63-BFA2-CF6A51A8D2F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"45273823-29EA-44DE-8444-3933402C5793\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"88F60E74-09DB-4D4A-B922-4A46EED0EC20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E242D3DE-D1DC-406A-BCC3-C4380B7EC369\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea30e11970a96cfe5e32c03a29332554573b4a10\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://osvdb.org/54892\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/35265\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35566\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/35623\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/35656\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/35847\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/36051\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/36131\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/36327\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/37471\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sourceforge.net/project/shownotes.php?release_id=504022\u0026group_id=42302\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://wiki.rpath.com/Advisories:rPSA-2009-0111\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1844\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1865\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.intel.com/support/network/sb/CS-030543.htm\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc8\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:135\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:148\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/06/03/2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1157.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1193.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/505254/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/512019/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/35185\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-793-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=502981\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11598\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11681\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8340\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1550.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea30e11970a96cfe5e32c03a29332554573b4a10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/54892\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35265\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35566\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35623\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35656\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35847\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/36051\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/36131\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/36327\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/37471\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sourceforge.net/project/shownotes.php?release_id=504022\u0026group_id=42302\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://wiki.rpath.com/Advisories:rPSA-2009-0111\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1844\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1865\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.intel.com/support/network/sb/CS-030543.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:135\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:148\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/06/03/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1157.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1193.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/505254/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/512019/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/35185\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-793-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=502981\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11598\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11681\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8340\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1550.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}
  RHSA-2009:1193
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix several security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* the possibility of a timeout value overflow was found in the Linux kernel\nhigh-resolution timers functionality, hrtimers. This could allow a local,\nunprivileged user to execute arbitrary code, or cause a denial of service\n(kernel panic). (CVE-2007-5966, Important)\n\n* a flaw was found in the Intel PRO/1000 network driver in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service or code execution. (CVE-2009-1385,\nImportant)\n\n* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in\nthe Linux kernel. This driver allowed interfaces using this driver to\nreceive frames larger than could be handled, which could lead to a remote\ndenial of service or code execution. (CVE-2009-1389, Important)\n\n* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a\nsetuid or setgid program was executed. A local, unprivileged user could use\nthis flaw to bypass the mmap_min_addr protection mechanism and perform a\nNULL pointer dereference attack, or bypass the Address Space Layout\nRandomization (ASLR) security feature. (CVE-2009-1895, Important)\n\n* Ramon de Carvalho Valle reported two flaws in the Linux kernel eCryptfs\nimplementation. A local attacker with permissions to perform an eCryptfs\nmount could modify the metadata of the files in that eCrypfts mount to\ncause a buffer overflow, leading to a denial of service or privilege\nescalation. (CVE-2009-2406, CVE-2009-2407, Important)\n\n* Konstantin Khlebnikov discovered a race condition in the ptrace\nimplementation in the Linux kernel. This race condition can occur when the\nprocess tracing and the process being traced participate in a core dump. A\nlocal, unprivileged user could use this flaw to trigger a deadlock,\nresulting in a partial denial of service. (CVE-2009-1388, Moderate)\n\nBug fixes (see References below for a link to more detailed notes):\n\n* possible dom0 crash when a Xen para-virtualized guest was installed while\nanother para-virtualized guest was rebooting. (BZ#497812)\n\n* no directory removal audit record if the directory and its subtree were\nrecursively watched by an audit rule. (BZ#507561)\n\n* running \"echo 1 \u003e /proc/sys/vm/drop_caches\" under high memory load could\ncause a kernel panic. (BZ#503692)\n\n* on 32-bit systems, core dumps for some multithreaded applications did not\ninclude all thread information. (BZ#505322)\n\n* a stack buffer used by get_event_name() was too small for nul terminator\nsprintf() writes. This could lead to an invalid pointer or kernel panic.\n(BZ#506906)\n\n* when using the aic94xx driver, systems with SATA drives may not boot due\nto a libsas bug. (BZ#506029)\n\n* Wacom Cintiq 21UX and Intuos stylus buttons were handled incorrectly when\nmoved away from and back to these tablets. (BZ#508275)\n\n* CPU \"soft lockup\" messages and possibe system hangs on systems with\ncertain Broadcom network devices and running the Linux kernel from the\nkernel-xen package. (BZ#503689)\n\n* on 64-bit PowerPC, getitimer() failed for programs using the ITIMER_REAL\ntimer that were also compiled for 64-bit systems. This caused such programs\nto abort. (BZ#510018)\n\n* write operations could be blocked even when using O_NONBLOCK. (BZ#510239)\n\n* the \"pci=nomsi\" option was required for installing and booting Red Hat\nEnterprise Linux 5.2 on systems with VIA VT3364 chipsets. (BZ#507529)\n\n* shutting down, destroying, or migrating Xen guests with large amounts of\nmemory could cause other guests to be temporarily unresponsive. (BZ#512311)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. Systems must be rebooted for this update\nto take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1193",
        "url": "https://access.redhat.com/errata/RHSA-2009:1193"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/security/updates/classification/#important",
        "url": "http://www.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.4/html/Technical_Notes/kernel.html#RHSA-2009-1193",
        "url": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.4/html/Technical_Notes/kernel.html#RHSA-2009-1193"
      },
      {
        "category": "external",
        "summary": "453135",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
      },
      {
        "category": "external",
        "summary": "497812",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497812"
      },
      {
        "category": "external",
        "summary": "502981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
      },
      {
        "category": "external",
        "summary": "503689",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503689"
      },
      {
        "category": "external",
        "summary": "503692",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503692"
      },
      {
        "category": "external",
        "summary": "504263",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504263"
      },
      {
        "category": "external",
        "summary": "504726",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
      },
      {
        "category": "external",
        "summary": "505322",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=505322"
      },
      {
        "category": "external",
        "summary": "506029",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=506029"
      },
      {
        "category": "external",
        "summary": "506906",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=506906"
      },
      {
        "category": "external",
        "summary": "507529",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=507529"
      },
      {
        "category": "external",
        "summary": "507561",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=507561"
      },
      {
        "category": "external",
        "summary": "508275",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=508275"
      },
      {
        "category": "external",
        "summary": "510018",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=510018"
      },
      {
        "category": "external",
        "summary": "510239",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=510239"
      },
      {
        "category": "external",
        "summary": "511171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
      },
      {
        "category": "external",
        "summary": "512311",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512311"
      },
      {
        "category": "external",
        "summary": "512861",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512861"
      },
      {
        "category": "external",
        "summary": "512885",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512885"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1193.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:07:18+00:00",
      "generator": {
        "date": "2025-10-09T13:07:18+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2009:1193",
      "initial_release_date": "2009-08-04T13:10:00+00:00",
      "revision_history": [
        {
          "date": "2009-08-04T13:10:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-08-04T09:15:15+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:07:18+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                  "product_id": "5Client",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux (v. 5 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux (v. 5 server)",
                  "product_id": "5Server",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux EUS (v. 5.3 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux EUS (v. 5.3 server)",
                  "product_id": "5Server-5.3.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:5.3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
                  "product_id": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.4.1.el5.src",
                "product": {
                  "name": "kernel-0:2.6.18-128.4.1.el5.src",
                  "product_id": "kernel-0:2.6.18-128.4.1.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
                  "product_id": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-128.4.1.el5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
                  "product_id": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.src",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.src as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.src",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.src",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2007-5966",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2007-12-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "453135"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value.  NOTE: some of these details are obtained from third party information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: non-root can trigger cpu_idle soft lockup",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and 4.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-0:2.6.18-128.4.1.el5.src",
          "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-5966"
        },
        {
          "category": "external",
          "summary": "RHBZ#453135",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5966",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-5966"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966"
        }
      ],
      "release_date": "2007-12-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-08-04T13:10:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1193"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: non-root can trigger cpu_idle soft lockup"
    },
    {
      "cve": "CVE-2009-1385",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-05-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "502981"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000_clean_rx_irq() denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-0:2.6.18-128.4.1.el5.src",
          "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "RHBZ#502981",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385"
        }
      ],
      "release_date": "2007-04-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-08-04T13:10:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1193"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000_clean_rx_irq() denial of service"
    },
    {
      "cve": "CVE-2009-1388",
      "discovery_date": "2009-06-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "504263"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ptrace_start function in kernel/ptrace.c in the Linux kernel 2.6.18 does not properly handle simultaneous execution of the do_coredump function, which allows local users to cause a denial of service (deadlock) via vectors involving the ptrace system call and a coredumping thread.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: do_coredump() vs ptrace_start() deadlock",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-0:2.6.18-128.4.1.el5.src",
          "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1388"
        },
        {
          "category": "external",
          "summary": "RHBZ#504263",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504263"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1388",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1388"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1388",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1388"
        }
      ],
      "release_date": "2009-07-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-08-04T13:10:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1193"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: do_coredump() vs ptrace_start() deadlock"
    },
    {
      "cve": "CVE-2009-1389",
      "discovery_date": "2009-06-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "504726"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r8169: fix crash when large packets are received",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-0:2.6.18-128.4.1.el5.src",
          "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1389"
        },
        {
          "category": "external",
          "summary": "RHBZ#504726",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1389",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389"
        }
      ],
      "release_date": "2009-02-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-08-04T13:10:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1193"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: r8169: fix crash when large packets are received"
    },
    {
      "cve": "CVE-2009-1895",
      "discovery_date": "2009-06-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "511171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: personality: fix PER_CLEAR_ON_SETID",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-0:2.6.18-128.4.1.el5.src",
          "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "RHBZ#511171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1895",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895"
        }
      ],
      "release_date": "2009-06-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-08-04T13:10:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1193"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: personality: fix PER_CLEAR_ON_SETID"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Ramon de C. Valle"
          ]
        }
      ],
      "cve": "CVE-2009-2406",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2009-07-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "512861"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Stack-based buffer overflow in the parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to not ensuring that the key signature length in a Tag 11 packet is compatible with the key signature buffer size.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ecryptfs stack overflow in parse_tag_11_packet()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG did not include support for eCryptfs, and therefore are not affected by this issue.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-0:2.6.18-128.4.1.el5.src",
          "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2406"
        },
        {
          "category": "external",
          "summary": "RHBZ#512861",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512861"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2406",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2406"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2406",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2406"
        }
      ],
      "release_date": "2009-07-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-08-04T13:10:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1193"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: ecryptfs stack overflow in parse_tag_11_packet()"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Ramon de C. Valle"
          ]
        }
      ],
      "cve": "CVE-2009-2407",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2009-07-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "512885"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ecryptfs heap overflow in parse_tag_3_packet()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG did not include support for eCryptfs, and therefore are not affected by this issue.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-0:2.6.18-128.4.1.el5.src",
          "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2407"
        },
        {
          "category": "external",
          "summary": "RHBZ#512885",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512885"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2407",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2407"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2407",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2407"
        }
      ],
      "release_date": "2009-07-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-08-04T13:10:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1193"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: ecryptfs heap overflow in parse_tag_3_packet()"
    }
  ]
}
  rhsa-2009_1193
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix several security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* the possibility of a timeout value overflow was found in the Linux kernel\nhigh-resolution timers functionality, hrtimers. This could allow a local,\nunprivileged user to execute arbitrary code, or cause a denial of service\n(kernel panic). (CVE-2007-5966, Important)\n\n* a flaw was found in the Intel PRO/1000 network driver in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service or code execution. (CVE-2009-1385,\nImportant)\n\n* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in\nthe Linux kernel. This driver allowed interfaces using this driver to\nreceive frames larger than could be handled, which could lead to a remote\ndenial of service or code execution. (CVE-2009-1389, Important)\n\n* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a\nsetuid or setgid program was executed. A local, unprivileged user could use\nthis flaw to bypass the mmap_min_addr protection mechanism and perform a\nNULL pointer dereference attack, or bypass the Address Space Layout\nRandomization (ASLR) security feature. (CVE-2009-1895, Important)\n\n* Ramon de Carvalho Valle reported two flaws in the Linux kernel eCryptfs\nimplementation. A local attacker with permissions to perform an eCryptfs\nmount could modify the metadata of the files in that eCrypfts mount to\ncause a buffer overflow, leading to a denial of service or privilege\nescalation. (CVE-2009-2406, CVE-2009-2407, Important)\n\n* Konstantin Khlebnikov discovered a race condition in the ptrace\nimplementation in the Linux kernel. This race condition can occur when the\nprocess tracing and the process being traced participate in a core dump. A\nlocal, unprivileged user could use this flaw to trigger a deadlock,\nresulting in a partial denial of service. (CVE-2009-1388, Moderate)\n\nBug fixes (see References below for a link to more detailed notes):\n\n* possible dom0 crash when a Xen para-virtualized guest was installed while\nanother para-virtualized guest was rebooting. (BZ#497812)\n\n* no directory removal audit record if the directory and its subtree were\nrecursively watched by an audit rule. (BZ#507561)\n\n* running \"echo 1 \u003e /proc/sys/vm/drop_caches\" under high memory load could\ncause a kernel panic. (BZ#503692)\n\n* on 32-bit systems, core dumps for some multithreaded applications did not\ninclude all thread information. (BZ#505322)\n\n* a stack buffer used by get_event_name() was too small for nul terminator\nsprintf() writes. This could lead to an invalid pointer or kernel panic.\n(BZ#506906)\n\n* when using the aic94xx driver, systems with SATA drives may not boot due\nto a libsas bug. (BZ#506029)\n\n* Wacom Cintiq 21UX and Intuos stylus buttons were handled incorrectly when\nmoved away from and back to these tablets. (BZ#508275)\n\n* CPU \"soft lockup\" messages and possibe system hangs on systems with\ncertain Broadcom network devices and running the Linux kernel from the\nkernel-xen package. (BZ#503689)\n\n* on 64-bit PowerPC, getitimer() failed for programs using the ITIMER_REAL\ntimer that were also compiled for 64-bit systems. This caused such programs\nto abort. (BZ#510018)\n\n* write operations could be blocked even when using O_NONBLOCK. (BZ#510239)\n\n* the \"pci=nomsi\" option was required for installing and booting Red Hat\nEnterprise Linux 5.2 on systems with VIA VT3364 chipsets. (BZ#507529)\n\n* shutting down, destroying, or migrating Xen guests with large amounts of\nmemory could cause other guests to be temporarily unresponsive. (BZ#512311)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. Systems must be rebooted for this update\nto take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1193",
        "url": "https://access.redhat.com/errata/RHSA-2009:1193"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/security/updates/classification/#important",
        "url": "http://www.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.4/html/Technical_Notes/kernel.html#RHSA-2009-1193",
        "url": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.4/html/Technical_Notes/kernel.html#RHSA-2009-1193"
      },
      {
        "category": "external",
        "summary": "453135",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
      },
      {
        "category": "external",
        "summary": "497812",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497812"
      },
      {
        "category": "external",
        "summary": "502981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
      },
      {
        "category": "external",
        "summary": "503689",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503689"
      },
      {
        "category": "external",
        "summary": "503692",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503692"
      },
      {
        "category": "external",
        "summary": "504263",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504263"
      },
      {
        "category": "external",
        "summary": "504726",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
      },
      {
        "category": "external",
        "summary": "505322",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=505322"
      },
      {
        "category": "external",
        "summary": "506029",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=506029"
      },
      {
        "category": "external",
        "summary": "506906",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=506906"
      },
      {
        "category": "external",
        "summary": "507529",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=507529"
      },
      {
        "category": "external",
        "summary": "507561",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=507561"
      },
      {
        "category": "external",
        "summary": "508275",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=508275"
      },
      {
        "category": "external",
        "summary": "510018",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=510018"
      },
      {
        "category": "external",
        "summary": "510239",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=510239"
      },
      {
        "category": "external",
        "summary": "511171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
      },
      {
        "category": "external",
        "summary": "512311",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512311"
      },
      {
        "category": "external",
        "summary": "512861",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512861"
      },
      {
        "category": "external",
        "summary": "512885",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512885"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1193.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-22T03:13:04+00:00",
      "generator": {
        "date": "2024-11-22T03:13:04+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2009:1193",
      "initial_release_date": "2009-08-04T13:10:00+00:00",
      "revision_history": [
        {
          "date": "2009-08-04T13:10:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-08-04T09:15:15+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T03:13:04+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                  "product_id": "5Client",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux (v. 5 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux (v. 5 server)",
                  "product_id": "5Server",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux EUS (v. 5.3 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux EUS (v. 5.3 server)",
                  "product_id": "5Server-5.3.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:5.3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
                  "product_id": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.4.1.el5.src",
                "product": {
                  "name": "kernel-0:2.6.18-128.4.1.el5.src",
                  "product_id": "kernel-0:2.6.18-128.4.1.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
                  "product_id": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-128.4.1.el5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
                  "product_id": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.src",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.src as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.src",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.src",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2007-5966",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2007-12-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "453135"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value.  NOTE: some of these details are obtained from third party information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: non-root can trigger cpu_idle soft lockup",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and 4.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-0:2.6.18-128.4.1.el5.src",
          "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-5966"
        },
        {
          "category": "external",
          "summary": "RHBZ#453135",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5966",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-5966"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966"
        }
      ],
      "release_date": "2007-12-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-08-04T13:10:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1193"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: non-root can trigger cpu_idle soft lockup"
    },
    {
      "cve": "CVE-2009-1385",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-05-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "502981"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000_clean_rx_irq() denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-0:2.6.18-128.4.1.el5.src",
          "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "RHBZ#502981",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385"
        }
      ],
      "release_date": "2007-04-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-08-04T13:10:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1193"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000_clean_rx_irq() denial of service"
    },
    {
      "cve": "CVE-2009-1388",
      "discovery_date": "2009-06-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "504263"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ptrace_start function in kernel/ptrace.c in the Linux kernel 2.6.18 does not properly handle simultaneous execution of the do_coredump function, which allows local users to cause a denial of service (deadlock) via vectors involving the ptrace system call and a coredumping thread.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: do_coredump() vs ptrace_start() deadlock",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-0:2.6.18-128.4.1.el5.src",
          "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1388"
        },
        {
          "category": "external",
          "summary": "RHBZ#504263",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504263"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1388",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1388"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1388",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1388"
        }
      ],
      "release_date": "2009-07-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-08-04T13:10:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1193"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: do_coredump() vs ptrace_start() deadlock"
    },
    {
      "cve": "CVE-2009-1389",
      "discovery_date": "2009-06-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "504726"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r8169: fix crash when large packets are received",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-0:2.6.18-128.4.1.el5.src",
          "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1389"
        },
        {
          "category": "external",
          "summary": "RHBZ#504726",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1389",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389"
        }
      ],
      "release_date": "2009-02-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-08-04T13:10:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1193"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: r8169: fix crash when large packets are received"
    },
    {
      "cve": "CVE-2009-1895",
      "discovery_date": "2009-06-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "511171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: personality: fix PER_CLEAR_ON_SETID",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-0:2.6.18-128.4.1.el5.src",
          "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "RHBZ#511171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1895",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895"
        }
      ],
      "release_date": "2009-06-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-08-04T13:10:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1193"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: personality: fix PER_CLEAR_ON_SETID"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Ramon de C. Valle"
          ]
        }
      ],
      "cve": "CVE-2009-2406",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2009-07-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "512861"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Stack-based buffer overflow in the parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to not ensuring that the key signature length in a Tag 11 packet is compatible with the key signature buffer size.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ecryptfs stack overflow in parse_tag_11_packet()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG did not include support for eCryptfs, and therefore are not affected by this issue.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-0:2.6.18-128.4.1.el5.src",
          "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2406"
        },
        {
          "category": "external",
          "summary": "RHBZ#512861",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512861"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2406",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2406"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2406",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2406"
        }
      ],
      "release_date": "2009-07-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-08-04T13:10:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1193"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: ecryptfs stack overflow in parse_tag_11_packet()"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Ramon de C. Valle"
          ]
        }
      ],
      "cve": "CVE-2009-2407",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2009-07-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "512885"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ecryptfs heap overflow in parse_tag_3_packet()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG did not include support for eCryptfs, and therefore are not affected by this issue.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-0:2.6.18-128.4.1.el5.src",
          "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2407"
        },
        {
          "category": "external",
          "summary": "RHBZ#512885",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512885"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2407",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2407"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2407",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2407"
        }
      ],
      "release_date": "2009-07-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-08-04T13:10:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1193"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: ecryptfs heap overflow in parse_tag_3_packet()"
    }
  ]
}
  rhsa-2009:1193
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix several security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* the possibility of a timeout value overflow was found in the Linux kernel\nhigh-resolution timers functionality, hrtimers. This could allow a local,\nunprivileged user to execute arbitrary code, or cause a denial of service\n(kernel panic). (CVE-2007-5966, Important)\n\n* a flaw was found in the Intel PRO/1000 network driver in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service or code execution. (CVE-2009-1385,\nImportant)\n\n* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in\nthe Linux kernel. This driver allowed interfaces using this driver to\nreceive frames larger than could be handled, which could lead to a remote\ndenial of service or code execution. (CVE-2009-1389, Important)\n\n* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a\nsetuid or setgid program was executed. A local, unprivileged user could use\nthis flaw to bypass the mmap_min_addr protection mechanism and perform a\nNULL pointer dereference attack, or bypass the Address Space Layout\nRandomization (ASLR) security feature. (CVE-2009-1895, Important)\n\n* Ramon de Carvalho Valle reported two flaws in the Linux kernel eCryptfs\nimplementation. A local attacker with permissions to perform an eCryptfs\nmount could modify the metadata of the files in that eCrypfts mount to\ncause a buffer overflow, leading to a denial of service or privilege\nescalation. (CVE-2009-2406, CVE-2009-2407, Important)\n\n* Konstantin Khlebnikov discovered a race condition in the ptrace\nimplementation in the Linux kernel. This race condition can occur when the\nprocess tracing and the process being traced participate in a core dump. A\nlocal, unprivileged user could use this flaw to trigger a deadlock,\nresulting in a partial denial of service. (CVE-2009-1388, Moderate)\n\nBug fixes (see References below for a link to more detailed notes):\n\n* possible dom0 crash when a Xen para-virtualized guest was installed while\nanother para-virtualized guest was rebooting. (BZ#497812)\n\n* no directory removal audit record if the directory and its subtree were\nrecursively watched by an audit rule. (BZ#507561)\n\n* running \"echo 1 \u003e /proc/sys/vm/drop_caches\" under high memory load could\ncause a kernel panic. (BZ#503692)\n\n* on 32-bit systems, core dumps for some multithreaded applications did not\ninclude all thread information. (BZ#505322)\n\n* a stack buffer used by get_event_name() was too small for nul terminator\nsprintf() writes. This could lead to an invalid pointer or kernel panic.\n(BZ#506906)\n\n* when using the aic94xx driver, systems with SATA drives may not boot due\nto a libsas bug. (BZ#506029)\n\n* Wacom Cintiq 21UX and Intuos stylus buttons were handled incorrectly when\nmoved away from and back to these tablets. (BZ#508275)\n\n* CPU \"soft lockup\" messages and possibe system hangs on systems with\ncertain Broadcom network devices and running the Linux kernel from the\nkernel-xen package. (BZ#503689)\n\n* on 64-bit PowerPC, getitimer() failed for programs using the ITIMER_REAL\ntimer that were also compiled for 64-bit systems. This caused such programs\nto abort. (BZ#510018)\n\n* write operations could be blocked even when using O_NONBLOCK. (BZ#510239)\n\n* the \"pci=nomsi\" option was required for installing and booting Red Hat\nEnterprise Linux 5.2 on systems with VIA VT3364 chipsets. (BZ#507529)\n\n* shutting down, destroying, or migrating Xen guests with large amounts of\nmemory could cause other guests to be temporarily unresponsive. (BZ#512311)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. Systems must be rebooted for this update\nto take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1193",
        "url": "https://access.redhat.com/errata/RHSA-2009:1193"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/security/updates/classification/#important",
        "url": "http://www.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.4/html/Technical_Notes/kernel.html#RHSA-2009-1193",
        "url": "http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.4/html/Technical_Notes/kernel.html#RHSA-2009-1193"
      },
      {
        "category": "external",
        "summary": "453135",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
      },
      {
        "category": "external",
        "summary": "497812",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497812"
      },
      {
        "category": "external",
        "summary": "502981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
      },
      {
        "category": "external",
        "summary": "503689",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503689"
      },
      {
        "category": "external",
        "summary": "503692",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503692"
      },
      {
        "category": "external",
        "summary": "504263",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504263"
      },
      {
        "category": "external",
        "summary": "504726",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
      },
      {
        "category": "external",
        "summary": "505322",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=505322"
      },
      {
        "category": "external",
        "summary": "506029",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=506029"
      },
      {
        "category": "external",
        "summary": "506906",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=506906"
      },
      {
        "category": "external",
        "summary": "507529",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=507529"
      },
      {
        "category": "external",
        "summary": "507561",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=507561"
      },
      {
        "category": "external",
        "summary": "508275",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=508275"
      },
      {
        "category": "external",
        "summary": "510018",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=510018"
      },
      {
        "category": "external",
        "summary": "510239",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=510239"
      },
      {
        "category": "external",
        "summary": "511171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
      },
      {
        "category": "external",
        "summary": "512311",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512311"
      },
      {
        "category": "external",
        "summary": "512861",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512861"
      },
      {
        "category": "external",
        "summary": "512885",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512885"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1193.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:07:18+00:00",
      "generator": {
        "date": "2025-10-09T13:07:18+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2009:1193",
      "initial_release_date": "2009-08-04T13:10:00+00:00",
      "revision_history": [
        {
          "date": "2009-08-04T13:10:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-08-04T09:15:15+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:07:18+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                  "product_id": "5Client",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux (v. 5 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux (v. 5 server)",
                  "product_id": "5Server",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux EUS (v. 5.3 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux EUS (v. 5.3 server)",
                  "product_id": "5Server-5.3.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:5.3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
                "product": {
                  "name": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
                  "product_id": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.4.1.el5?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
                  "product_id": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.4.1.el5.src",
                "product": {
                  "name": "kernel-0:2.6.18-128.4.1.el5.src",
                  "product_id": "kernel-0:2.6.18-128.4.1.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
                  "product_id": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.4.1.el5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
                  "product_id": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-128.4.1.el5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
                  "product_id": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
                  "product_id": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.4.1.el5?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.src",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.src as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.src",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)",
          "product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server-5.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.src",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-128.4.1.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-128.4.1.el5.noarch",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
        "relates_to_product_reference": "5Server"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2007-5966",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2007-12-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "453135"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value.  NOTE: some of these details are obtained from third party information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: non-root can trigger cpu_idle soft lockup",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and 4.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-0:2.6.18-128.4.1.el5.src",
          "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-5966"
        },
        {
          "category": "external",
          "summary": "RHBZ#453135",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5966",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-5966"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966"
        }
      ],
      "release_date": "2007-12-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-08-04T13:10:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1193"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: non-root can trigger cpu_idle soft lockup"
    },
    {
      "cve": "CVE-2009-1385",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-05-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "502981"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000_clean_rx_irq() denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-0:2.6.18-128.4.1.el5.src",
          "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "RHBZ#502981",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385"
        }
      ],
      "release_date": "2007-04-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-08-04T13:10:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1193"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000_clean_rx_irq() denial of service"
    },
    {
      "cve": "CVE-2009-1388",
      "discovery_date": "2009-06-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "504263"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ptrace_start function in kernel/ptrace.c in the Linux kernel 2.6.18 does not properly handle simultaneous execution of the do_coredump function, which allows local users to cause a denial of service (deadlock) via vectors involving the ptrace system call and a coredumping thread.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: do_coredump() vs ptrace_start() deadlock",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-0:2.6.18-128.4.1.el5.src",
          "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1388"
        },
        {
          "category": "external",
          "summary": "RHBZ#504263",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504263"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1388",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1388"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1388",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1388"
        }
      ],
      "release_date": "2009-07-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-08-04T13:10:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1193"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: do_coredump() vs ptrace_start() deadlock"
    },
    {
      "cve": "CVE-2009-1389",
      "discovery_date": "2009-06-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "504726"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r8169: fix crash when large packets are received",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-0:2.6.18-128.4.1.el5.src",
          "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1389"
        },
        {
          "category": "external",
          "summary": "RHBZ#504726",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1389",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389"
        }
      ],
      "release_date": "2009-02-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-08-04T13:10:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1193"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: r8169: fix crash when large packets are received"
    },
    {
      "cve": "CVE-2009-1895",
      "discovery_date": "2009-06-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "511171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: personality: fix PER_CLEAR_ON_SETID",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-0:2.6.18-128.4.1.el5.src",
          "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "RHBZ#511171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1895",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895"
        }
      ],
      "release_date": "2009-06-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-08-04T13:10:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1193"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: personality: fix PER_CLEAR_ON_SETID"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Ramon de C. Valle"
          ]
        }
      ],
      "cve": "CVE-2009-2406",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2009-07-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "512861"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Stack-based buffer overflow in the parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to not ensuring that the key signature length in a Tag 11 packet is compatible with the key signature buffer size.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ecryptfs stack overflow in parse_tag_11_packet()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG did not include support for eCryptfs, and therefore are not affected by this issue.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-0:2.6.18-128.4.1.el5.src",
          "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2406"
        },
        {
          "category": "external",
          "summary": "RHBZ#512861",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512861"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2406",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2406"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2406",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2406"
        }
      ],
      "release_date": "2009-07-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-08-04T13:10:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1193"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: ecryptfs stack overflow in parse_tag_11_packet()"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Ramon de C. Valle"
          ]
        }
      ],
      "cve": "CVE-2009-2407",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2009-07-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "512885"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ecryptfs heap overflow in parse_tag_3_packet()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and Red Hat Enterprise MRG did not include support for eCryptfs, and therefore are not affected by this issue.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-0:2.6.18-128.4.1.el5.src",
          "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-0:2.6.18-128.4.1.el5.src",
          "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2407"
        },
        {
          "category": "external",
          "summary": "RHBZ#512885",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512885"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2407",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2407"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2407",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2407"
        }
      ],
      "release_date": "2009-07-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-08-04T13:10:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1193"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-0:2.6.18-128.4.1.el5.src",
            "5Client:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server-5.3.Z:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-0:2.6.18-128.4.1.el5.src",
            "5Server:kernel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.4.1.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.4.1.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.4.1.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.4.1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: ecryptfs heap overflow in parse_tag_3_packet()"
    }
  ]
}
  RHSA-2009:1157
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel-rt packages that fix several security issues and various\nbugs are now available for Red Hat Enterprise MRG 1.1.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* a flaw was found in the Intel PRO/1000 network driver in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service or code execution. (CVE-2009-1385,\nImportant)\n\n* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in\nthe Linux kernel. This driver allowed interfaces using this driver to\nreceive frames larger than what could be handled. This could lead to a\nremote denial of service or code execution. (CVE-2009-1389, Important)\n\n* several flaws were found in the way the Linux kernel CIFS implementation\nhandles Unicode strings. CIFS clients convert Unicode strings sent by a\nserver to their local character sets, and then write those strings into\nmemory. If a malicious server sent a long enough string, it could write\npast the end of the target memory region and corrupt other memory areas,\npossibly leading to a denial of service or privilege escalation on the\nclient mounting the CIFS share. (CVE-2009-1633, Important)\n\n* Frank Filz reported the NFSv4 client was missing a file permission check\nfor the execute bit in some situations. This could allow local,\nunprivileged users to run non-executable files on NFSv4 mounted file\nsystems. (CVE-2009-1630, Moderate)\n\n* a deadlock flaw was found in the Linux kernel splice implementation. This\ndeadlock could occur during interactions between the\ngeneric_file_splice_write() and splice_from_pipe() functions, possibly\nleading to a partial denial of service on the file system partition where\nthe deadlock occurs. (CVE-2009-1961, Moderate)\n\nBug fixes:\n\n* a stack buffer used by get_event_name() was not large enough to\naccommodate the nul terminator that sprintf() writes. In some cases, this\ncould lead to an invalid pointer or a kernel panic. With this update, the\nfunction is modified to allow space for the nul terminator. (BZ#503902)\n\n* free_bootmem() was hard-coded to use node 0. This could have caused a\nkernel panic during boot on a NUMA system that happens to boot on a node\nother than node 0. With this update, free_bootmem() acts on the current\nnode, resolving this issue. (BZ#503048)\n\n* CPU flag mishandling caused TSC clocksource synchronization to fail (TSC\nwas marked unstable) on the Intel\u00ae microarchitecture (Nehalem). In\naddition, TSC clocksource checks added to the 64-bit kernel code are now\npresent for i386 systems. Also, \"/proc/cpuinfo\" now shows TSC-related\nflags. (BZ#50289, BZ#508756)\n\n* barriers are used to make sure delayed work requested from threads is\nprocessed before continuing. run_workqueue(), however, exited before\nprocessing all barriers, causing threads to wait forever. In a reported\ncase, this bug caused missing path issues for Device Mapper Multipathing.\n(BZ#504133)\n\n* calling pipe() with an invalid address caused a file descriptor leak.\n(BZ#509629)\n\n* the code to add \"/dev/rtc\" contained a printk statement without a log\nlevel prefix. (BZ#510099)\n\n* an extra check has been added to the realtime kernel to avoid a rare\ncorruption of the FPU (Floating Point Unit) stack, which could occur if a\ntask using FPU registers was preempted by an interruption. (BZ#509359)\n\n* fix a boot-up problem on HP ProLiant SL2x170z G6 and similar systems by\nadding Intel ICH10 controllers back to the ata_piix driver. (BZ#508783)\n\n* converts a UID comparison in AGP to a more secure capability check. By\ndefault, \"/dev/agpgart\" is accessible only to the root user. (BZ#505493)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1157",
        "url": "https://access.redhat.com/errata/RHSA-2009:1157"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "496572",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572"
      },
      {
        "category": "external",
        "summary": "500297",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297"
      },
      {
        "category": "external",
        "summary": "502893",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502893"
      },
      {
        "category": "external",
        "summary": "502981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
      },
      {
        "category": "external",
        "summary": "503048",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503048"
      },
      {
        "category": "external",
        "summary": "503474",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503474"
      },
      {
        "category": "external",
        "summary": "503902",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503902"
      },
      {
        "category": "external",
        "summary": "504133",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504133"
      },
      {
        "category": "external",
        "summary": "504726",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
      },
      {
        "category": "external",
        "summary": "505493",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=505493"
      },
      {
        "category": "external",
        "summary": "509629",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=509629"
      },
      {
        "category": "external",
        "summary": "510099",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=510099"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1157.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:17:14+00:00",
      "generator": {
        "date": "2025-10-09T13:17:14+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2009:1157",
      "initial_release_date": "2009-07-14T19:11:00+00:00",
      "revision_history": [
        {
          "date": "2009-07-14T19:11:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-07-14T15:11:05+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:17:14+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "MRG Realtime for RHEL 5 Server",
                "product": {
                  "name": "MRG Realtime for RHEL 5 Server",
                  "product_id": "5Server-MRG-Realtime-1.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_mrg:1::el5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise MRG for RHEL-5"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
                "product": {
                  "name": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
                  "product_id": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-126.el5rt?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-126.el5rt.src",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-126.el5rt.src",
                  "product_id": "kernel-rt-0:2.6.24.7-126.el5rt.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-126.el5rt?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-126.el5rt.src as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-126.el5rt.src",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch"
        },
        "product_reference": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-1385",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-05-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "502981"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000_clean_rx_irq() denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "RHBZ#502981",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385"
        }
      ],
      "release_date": "2007-04-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-07-14T19:11:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1157"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000_clean_rx_irq() denial of service"
    },
    {
      "cve": "CVE-2009-1389",
      "discovery_date": "2009-06-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "504726"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r8169: fix crash when large packets are received",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1389"
        },
        {
          "category": "external",
          "summary": "RHBZ#504726",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1389",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389"
        }
      ],
      "release_date": "2009-02-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-07-14T19:11:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1157"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: r8169: fix crash when large packets are received"
    },
    {
      "cve": "CVE-2009-1630",
      "discovery_date": "2009-05-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "500297"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1630"
        },
        {
          "category": "external",
          "summary": "RHBZ#500297",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1630",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1630"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630"
        }
      ],
      "release_date": "2009-05-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-07-14T19:11:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1157"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission"
    },
    {
      "cve": "CVE-2009-1633",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-04-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "496572"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1633"
        },
        {
          "category": "external",
          "summary": "RHBZ#496572",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1633",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1633"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633"
        }
      ],
      "release_date": "2009-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-07-14T19:11:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1157"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server"
    },
    {
      "cve": "CVE-2009-1961",
      "discovery_date": "2009-06-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "503474"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The inode double locking code in fs/ocfs2/file.c in the Linux kernel 2.6.30 before 2.6.30-rc3, 2.6.27 before 2.6.27.24, 2.6.29 before 2.6.29.4, and possibly other versions down to 2.6.19 allows local users to cause a denial of service (prevention of file creation and removal) via a series of splice system calls that trigger a deadlock between the generic_file_splice_write, splice_from_pipe, and ocfs2_file_splice_write functions.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: splice local denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise Linux MRG 2.\n\nThis issue was fixed in Red Hat Enterprise Linux MRG 1 via https://rhn.redhat.com/errata/RHSA-2009-1157.html.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1961"
        },
        {
          "category": "external",
          "summary": "RHBZ#503474",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503474"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1961",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1961"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1961",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1961"
        }
      ],
      "release_date": "2009-04-06T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-07-14T19:11:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1157"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: splice local denial of service"
    }
  ]
}
  rhsa-2010_0079
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.2 Extended Update Support.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* a flaw was found in the IPv6 Extension Header (EH) handling\nimplementation in the Linux kernel. The skb-\u003edst data structure was not\nproperly validated in the ipv6_hop_jumbo() function. This could possibly\nlead to a remote denial of service. (CVE-2007-4567, Important)\n\n* the possibility of a timeout value overflow was found in the Linux kernel\nhigh-resolution timers functionality, hrtimers. This could allow a local,\nunprivileged user to execute arbitrary code, or cause a denial of service\n(kernel panic). (CVE-2007-5966, Important)\n\n* memory leaks were found on some error paths in the icmp_send()\nfunction in the Linux kernel. This could, potentially, cause the network\nconnectivity to cease. (CVE-2009-0778, Important)\n\n* a deficiency was found in the Linux kernel system call auditing\nimplementation on 64-bit systems. This could allow a local, unprivileged\nuser to circumvent a system call audit configuration, if that configuration\nfiltered based on the \"syscall\" number or arguments. (CVE-2009-0834,\nImportant)\n\n* a flaw was found in the Intel PRO/1000 Linux driver (e1000) in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service or code execution. (CVE-2009-1385,\nImportant)\n\n* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a\nsetuid or setgid program was executed. A local, unprivileged user could use\nthis flaw to bypass the mmap_min_addr protection mechanism and perform a\nNULL pointer dereference attack, or bypass the Address Space Layout\nRandomization (ASLR) security feature. (CVE-2009-1895, Important)\n\n* a flaw was found in each of the following Intel PRO/1000 Linux drivers in\nthe Linux kernel: e1000 and e1000e. A remote attacker using packets larger\nthan the MTU could bypass the existing fragment check, resulting in\npartial, invalid frames being passed to the network stack. These flaws\ncould also possibly be used to trigger a remote denial of service.\n(CVE-2009-4536, CVE-2009-4538, Important)\n\n* a flaw was found in the Realtek r8169 Ethernet driver in the Linux\nkernel. Receiving overly-long frames with a certain revision of the network\ncards supported by this driver could possibly result in a remote denial of\nservice. (CVE-2009-4537, Important)\n\nNote: This update also fixes several bugs. Documentation for these bug\nfixes will be available shortly from\nwww.redhat.com/docs/en-US/errata/RHSA-2010-0079/Kernel_Security_Update/\nindex.html\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0079",
        "url": "https://access.redhat.com/errata/RHSA-2010:0079"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "453135",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
      },
      {
        "category": "external",
        "summary": "485163",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=485163"
      },
      {
        "category": "external",
        "summary": "487990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
      },
      {
        "category": "external",
        "summary": "502981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
      },
      {
        "category": "external",
        "summary": "511171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
      },
      {
        "category": "external",
        "summary": "524179",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524179"
      },
      {
        "category": "external",
        "summary": "546226",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546226"
      },
      {
        "category": "external",
        "summary": "546227",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546227"
      },
      {
        "category": "external",
        "summary": "546228",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546228"
      },
      {
        "category": "external",
        "summary": "546229",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546229"
      },
      {
        "category": "external",
        "summary": "546230",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546230"
      },
      {
        "category": "external",
        "summary": "546231",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546231"
      },
      {
        "category": "external",
        "summary": "546232",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546232"
      },
      {
        "category": "external",
        "summary": "546233",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546233"
      },
      {
        "category": "external",
        "summary": "546234",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546234"
      },
      {
        "category": "external",
        "summary": "546236",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546236"
      },
      {
        "category": "external",
        "summary": "547299",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547299"
      },
      {
        "category": "external",
        "summary": "548074",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548074"
      },
      {
        "category": "external",
        "summary": "548641",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548641"
      },
      {
        "category": "external",
        "summary": "550907",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907"
      },
      {
        "category": "external",
        "summary": "551214",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214"
      },
      {
        "category": "external",
        "summary": "552126",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126"
      },
      {
        "category": "external",
        "summary": "553133",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=553133"
      },
      {
        "category": "external",
        "summary": "555052",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=555052"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0079.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-22T03:02:48+00:00",
      "generator": {
        "date": "2024-11-22T03:02:48+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2010:0079",
      "initial_release_date": "2010-02-02T21:01:00+00:00",
      "revision_history": [
        {
          "date": "2010-02-02T21:01:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-02-02T16:01:07+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T03:02:48+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux EUS (v. 5.2 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux EUS (v. 5.2 server)",
                  "product_id": "5Server-5.2.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:5.2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-xen-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-xen-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-PAE-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-PAE-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.i386",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.i386",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-xen-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.src",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.src",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.18-92.1.35.el5.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.18-92.1.35.el5.noarch",
                  "product_id": "kernel-doc-0:2.6.18-92.1.35.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-92.1.35.el5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.src as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.src",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-92.1.35.el5.noarch as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-92.1.35.el5.noarch",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.i386",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.ppc",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2007-4567",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-12-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "548641"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.22 does not properly validate the hop-by-hop IPv6 extended header, which allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted IPv6 packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ipv6_hop_jumbo remote system crash",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commit a11d206d that introduced the problem.\n\nThis upstream commit was backported in Red Hat Enterprise Linux 5 via RHBA-2008:0314. It was reported and addressed in Red Hat Enterprise Linux 5 via RHSA-2010:0019.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-4567"
        },
        {
          "category": "external",
          "summary": "RHBZ#548641",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548641"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4567",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-4567"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4567",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4567"
        }
      ],
      "release_date": "2007-09-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: ipv6_hop_jumbo remote system crash"
    },
    {
      "cve": "CVE-2007-5966",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2007-12-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "453135"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value.  NOTE: some of these details are obtained from third party information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: non-root can trigger cpu_idle soft lockup",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and 4.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-5966"
        },
        {
          "category": "external",
          "summary": "RHBZ#453135",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5966",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-5966"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966"
        }
      ],
      "release_date": "2007-12-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: non-root can trigger cpu_idle soft lockup"
    },
    {
      "cve": "CVE-2009-0778",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2009-02-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "485163"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The icmp_send function in net/ipv4/icmp.c in the Linux kernel before 2.6.25, when configured as a router with a REJECT route, does not properly manage the Protocol Independent Destination Cache (aka DST) in some situations involving transmission of an ICMP Host Unreachable message, which allows remote attackers to cause a denial of service (connectivity outage) by sending a large series of packets to many destination IP addresses within this REJECT route, related to an \"rt_cache leak.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: rt_cache leak leads to lack of network connectivity",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0778"
        },
        {
          "category": "external",
          "summary": "RHBZ#485163",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=485163"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0778",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0778"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0778",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0778"
        }
      ],
      "release_date": "2008-03-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: rt_cache leak leads to lack of network connectivity"
    },
    {
      "cve": "CVE-2009-0834",
      "discovery_date": "2009-03-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "487990"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86-64: syscall-audit: 32/64 syscall hole",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "RHBZ#487990",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0834",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834"
        }
      ],
      "release_date": "2009-02-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: x86-64: syscall-audit: 32/64 syscall hole"
    },
    {
      "cve": "CVE-2009-1385",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-05-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "502981"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000_clean_rx_irq() denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "RHBZ#502981",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385"
        }
      ],
      "release_date": "2007-04-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000_clean_rx_irq() denial of service"
    },
    {
      "cve": "CVE-2009-1895",
      "discovery_date": "2009-06-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "511171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: personality: fix PER_CLEAR_ON_SETID",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "RHBZ#511171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1895",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895"
        }
      ],
      "release_date": "2009-06-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: personality: fix PER_CLEAR_ON_SETID"
    },
    {
      "cve": "CVE-2009-4536",
      "discovery_date": "2009-12-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "552126"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000 issue reported at 26c3",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4536"
        },
        {
          "category": "external",
          "summary": "RHBZ#552126",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4536",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4536"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536"
        }
      ],
      "release_date": "2009-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000 issue reported at 26c3"
    },
    {
      "cve": "CVE-2009-4537",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-12-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "550907"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing \u0027\\0\u0027 characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r8169 issue reported at 26c3",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4537"
        },
        {
          "category": "external",
          "summary": "RHBZ#550907",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4537",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4537"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537"
        }
      ],
      "release_date": "2009-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: r8169 issue reported at 26c3"
    },
    {
      "cve": "CVE-2009-4538",
      "discovery_date": "2009-12-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "551214"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000e frame fragment issue",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4538"
        },
        {
          "category": "external",
          "summary": "RHBZ#551214",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4538",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4538"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538"
        }
      ],
      "release_date": "2009-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000e frame fragment issue"
    }
  ]
}
  rhsa-2009_1157
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel-rt packages that fix several security issues and various\nbugs are now available for Red Hat Enterprise MRG 1.1.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* a flaw was found in the Intel PRO/1000 network driver in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service or code execution. (CVE-2009-1385,\nImportant)\n\n* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in\nthe Linux kernel. This driver allowed interfaces using this driver to\nreceive frames larger than what could be handled. This could lead to a\nremote denial of service or code execution. (CVE-2009-1389, Important)\n\n* several flaws were found in the way the Linux kernel CIFS implementation\nhandles Unicode strings. CIFS clients convert Unicode strings sent by a\nserver to their local character sets, and then write those strings into\nmemory. If a malicious server sent a long enough string, it could write\npast the end of the target memory region and corrupt other memory areas,\npossibly leading to a denial of service or privilege escalation on the\nclient mounting the CIFS share. (CVE-2009-1633, Important)\n\n* Frank Filz reported the NFSv4 client was missing a file permission check\nfor the execute bit in some situations. This could allow local,\nunprivileged users to run non-executable files on NFSv4 mounted file\nsystems. (CVE-2009-1630, Moderate)\n\n* a deadlock flaw was found in the Linux kernel splice implementation. This\ndeadlock could occur during interactions between the\ngeneric_file_splice_write() and splice_from_pipe() functions, possibly\nleading to a partial denial of service on the file system partition where\nthe deadlock occurs. (CVE-2009-1961, Moderate)\n\nBug fixes:\n\n* a stack buffer used by get_event_name() was not large enough to\naccommodate the nul terminator that sprintf() writes. In some cases, this\ncould lead to an invalid pointer or a kernel panic. With this update, the\nfunction is modified to allow space for the nul terminator. (BZ#503902)\n\n* free_bootmem() was hard-coded to use node 0. This could have caused a\nkernel panic during boot on a NUMA system that happens to boot on a node\nother than node 0. With this update, free_bootmem() acts on the current\nnode, resolving this issue. (BZ#503048)\n\n* CPU flag mishandling caused TSC clocksource synchronization to fail (TSC\nwas marked unstable) on the Intel\u00ae microarchitecture (Nehalem). In\naddition, TSC clocksource checks added to the 64-bit kernel code are now\npresent for i386 systems. Also, \"/proc/cpuinfo\" now shows TSC-related\nflags. (BZ#50289, BZ#508756)\n\n* barriers are used to make sure delayed work requested from threads is\nprocessed before continuing. run_workqueue(), however, exited before\nprocessing all barriers, causing threads to wait forever. In a reported\ncase, this bug caused missing path issues for Device Mapper Multipathing.\n(BZ#504133)\n\n* calling pipe() with an invalid address caused a file descriptor leak.\n(BZ#509629)\n\n* the code to add \"/dev/rtc\" contained a printk statement without a log\nlevel prefix. (BZ#510099)\n\n* an extra check has been added to the realtime kernel to avoid a rare\ncorruption of the FPU (Floating Point Unit) stack, which could occur if a\ntask using FPU registers was preempted by an interruption. (BZ#509359)\n\n* fix a boot-up problem on HP ProLiant SL2x170z G6 and similar systems by\nadding Intel ICH10 controllers back to the ata_piix driver. (BZ#508783)\n\n* converts a UID comparison in AGP to a more secure capability check. By\ndefault, \"/dev/agpgart\" is accessible only to the root user. (BZ#505493)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1157",
        "url": "https://access.redhat.com/errata/RHSA-2009:1157"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "496572",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572"
      },
      {
        "category": "external",
        "summary": "500297",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297"
      },
      {
        "category": "external",
        "summary": "502893",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502893"
      },
      {
        "category": "external",
        "summary": "502981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
      },
      {
        "category": "external",
        "summary": "503048",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503048"
      },
      {
        "category": "external",
        "summary": "503474",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503474"
      },
      {
        "category": "external",
        "summary": "503902",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503902"
      },
      {
        "category": "external",
        "summary": "504133",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504133"
      },
      {
        "category": "external",
        "summary": "504726",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
      },
      {
        "category": "external",
        "summary": "505493",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=505493"
      },
      {
        "category": "external",
        "summary": "509629",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=509629"
      },
      {
        "category": "external",
        "summary": "510099",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=510099"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1157.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-22T03:12:59+00:00",
      "generator": {
        "date": "2024-11-22T03:12:59+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2009:1157",
      "initial_release_date": "2009-07-14T19:11:00+00:00",
      "revision_history": [
        {
          "date": "2009-07-14T19:11:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-07-14T15:11:05+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T03:12:59+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "MRG Realtime for RHEL 5 Server",
                "product": {
                  "name": "MRG Realtime for RHEL 5 Server",
                  "product_id": "5Server-MRG-Realtime-1.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_mrg:1::el5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise MRG for RHEL-5"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
                "product": {
                  "name": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
                  "product_id": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-126.el5rt?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-126.el5rt.src",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-126.el5rt.src",
                  "product_id": "kernel-rt-0:2.6.24.7-126.el5rt.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-126.el5rt?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-126.el5rt.src as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-126.el5rt.src",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch"
        },
        "product_reference": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-1385",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-05-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "502981"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000_clean_rx_irq() denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "RHBZ#502981",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385"
        }
      ],
      "release_date": "2007-04-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-07-14T19:11:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1157"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000_clean_rx_irq() denial of service"
    },
    {
      "cve": "CVE-2009-1389",
      "discovery_date": "2009-06-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "504726"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r8169: fix crash when large packets are received",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1389"
        },
        {
          "category": "external",
          "summary": "RHBZ#504726",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1389",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389"
        }
      ],
      "release_date": "2009-02-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-07-14T19:11:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1157"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: r8169: fix crash when large packets are received"
    },
    {
      "cve": "CVE-2009-1630",
      "discovery_date": "2009-05-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "500297"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1630"
        },
        {
          "category": "external",
          "summary": "RHBZ#500297",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1630",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1630"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630"
        }
      ],
      "release_date": "2009-05-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-07-14T19:11:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1157"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission"
    },
    {
      "cve": "CVE-2009-1633",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-04-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "496572"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1633"
        },
        {
          "category": "external",
          "summary": "RHBZ#496572",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1633",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1633"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633"
        }
      ],
      "release_date": "2009-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-07-14T19:11:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1157"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server"
    },
    {
      "cve": "CVE-2009-1961",
      "discovery_date": "2009-06-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "503474"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The inode double locking code in fs/ocfs2/file.c in the Linux kernel 2.6.30 before 2.6.30-rc3, 2.6.27 before 2.6.27.24, 2.6.29 before 2.6.29.4, and possibly other versions down to 2.6.19 allows local users to cause a denial of service (prevention of file creation and removal) via a series of splice system calls that trigger a deadlock between the generic_file_splice_write, splice_from_pipe, and ocfs2_file_splice_write functions.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: splice local denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise Linux MRG 2.\n\nThis issue was fixed in Red Hat Enterprise Linux MRG 1 via https://rhn.redhat.com/errata/RHSA-2009-1157.html.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1961"
        },
        {
          "category": "external",
          "summary": "RHBZ#503474",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503474"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1961",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1961"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1961",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1961"
        }
      ],
      "release_date": "2009-04-06T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-07-14T19:11:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1157"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: splice local denial of service"
    }
  ]
}
  rhsa-2009:1157
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel-rt packages that fix several security issues and various\nbugs are now available for Red Hat Enterprise MRG 1.1.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* a flaw was found in the Intel PRO/1000 network driver in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service or code execution. (CVE-2009-1385,\nImportant)\n\n* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in\nthe Linux kernel. This driver allowed interfaces using this driver to\nreceive frames larger than what could be handled. This could lead to a\nremote denial of service or code execution. (CVE-2009-1389, Important)\n\n* several flaws were found in the way the Linux kernel CIFS implementation\nhandles Unicode strings. CIFS clients convert Unicode strings sent by a\nserver to their local character sets, and then write those strings into\nmemory. If a malicious server sent a long enough string, it could write\npast the end of the target memory region and corrupt other memory areas,\npossibly leading to a denial of service or privilege escalation on the\nclient mounting the CIFS share. (CVE-2009-1633, Important)\n\n* Frank Filz reported the NFSv4 client was missing a file permission check\nfor the execute bit in some situations. This could allow local,\nunprivileged users to run non-executable files on NFSv4 mounted file\nsystems. (CVE-2009-1630, Moderate)\n\n* a deadlock flaw was found in the Linux kernel splice implementation. This\ndeadlock could occur during interactions between the\ngeneric_file_splice_write() and splice_from_pipe() functions, possibly\nleading to a partial denial of service on the file system partition where\nthe deadlock occurs. (CVE-2009-1961, Moderate)\n\nBug fixes:\n\n* a stack buffer used by get_event_name() was not large enough to\naccommodate the nul terminator that sprintf() writes. In some cases, this\ncould lead to an invalid pointer or a kernel panic. With this update, the\nfunction is modified to allow space for the nul terminator. (BZ#503902)\n\n* free_bootmem() was hard-coded to use node 0. This could have caused a\nkernel panic during boot on a NUMA system that happens to boot on a node\nother than node 0. With this update, free_bootmem() acts on the current\nnode, resolving this issue. (BZ#503048)\n\n* CPU flag mishandling caused TSC clocksource synchronization to fail (TSC\nwas marked unstable) on the Intel\u00ae microarchitecture (Nehalem). In\naddition, TSC clocksource checks added to the 64-bit kernel code are now\npresent for i386 systems. Also, \"/proc/cpuinfo\" now shows TSC-related\nflags. (BZ#50289, BZ#508756)\n\n* barriers are used to make sure delayed work requested from threads is\nprocessed before continuing. run_workqueue(), however, exited before\nprocessing all barriers, causing threads to wait forever. In a reported\ncase, this bug caused missing path issues for Device Mapper Multipathing.\n(BZ#504133)\n\n* calling pipe() with an invalid address caused a file descriptor leak.\n(BZ#509629)\n\n* the code to add \"/dev/rtc\" contained a printk statement without a log\nlevel prefix. (BZ#510099)\n\n* an extra check has been added to the realtime kernel to avoid a rare\ncorruption of the FPU (Floating Point Unit) stack, which could occur if a\ntask using FPU registers was preempted by an interruption. (BZ#509359)\n\n* fix a boot-up problem on HP ProLiant SL2x170z G6 and similar systems by\nadding Intel ICH10 controllers back to the ata_piix driver. (BZ#508783)\n\n* converts a UID comparison in AGP to a more secure capability check. By\ndefault, \"/dev/agpgart\" is accessible only to the root user. (BZ#505493)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1157",
        "url": "https://access.redhat.com/errata/RHSA-2009:1157"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "496572",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572"
      },
      {
        "category": "external",
        "summary": "500297",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297"
      },
      {
        "category": "external",
        "summary": "502893",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502893"
      },
      {
        "category": "external",
        "summary": "502981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
      },
      {
        "category": "external",
        "summary": "503048",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503048"
      },
      {
        "category": "external",
        "summary": "503474",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503474"
      },
      {
        "category": "external",
        "summary": "503902",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503902"
      },
      {
        "category": "external",
        "summary": "504133",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504133"
      },
      {
        "category": "external",
        "summary": "504726",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
      },
      {
        "category": "external",
        "summary": "505493",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=505493"
      },
      {
        "category": "external",
        "summary": "509629",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=509629"
      },
      {
        "category": "external",
        "summary": "510099",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=510099"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1157.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:17:14+00:00",
      "generator": {
        "date": "2025-10-09T13:17:14+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2009:1157",
      "initial_release_date": "2009-07-14T19:11:00+00:00",
      "revision_history": [
        {
          "date": "2009-07-14T19:11:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-07-14T15:11:05+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:17:14+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "MRG Realtime for RHEL 5 Server",
                "product": {
                  "name": "MRG Realtime for RHEL 5 Server",
                  "product_id": "5Server-MRG-Realtime-1.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_mrg:1::el5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise MRG for RHEL-5"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
                "product": {
                  "name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
                  "product_id": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-126.el5rt?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
                  "product_id": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-126.el5rt?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
                "product": {
                  "name": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
                  "product_id": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-126.el5rt?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-126.el5rt.src",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-126.el5rt.src",
                  "product_id": "kernel-rt-0:2.6.24.7-126.el5rt.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-126.el5rt?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-126.el5rt.src as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-126.el5rt.src",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch"
        },
        "product_reference": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-1385",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-05-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "502981"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000_clean_rx_irq() denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "RHBZ#502981",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385"
        }
      ],
      "release_date": "2007-04-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-07-14T19:11:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1157"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000_clean_rx_irq() denial of service"
    },
    {
      "cve": "CVE-2009-1389",
      "discovery_date": "2009-06-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "504726"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r8169: fix crash when large packets are received",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1389"
        },
        {
          "category": "external",
          "summary": "RHBZ#504726",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1389",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389"
        }
      ],
      "release_date": "2009-02-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-07-14T19:11:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1157"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: r8169: fix crash when large packets are received"
    },
    {
      "cve": "CVE-2009-1630",
      "discovery_date": "2009-05-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "500297"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1630"
        },
        {
          "category": "external",
          "summary": "RHBZ#500297",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1630",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1630"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630"
        }
      ],
      "release_date": "2009-05-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-07-14T19:11:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1157"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission"
    },
    {
      "cve": "CVE-2009-1633",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-04-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "496572"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1633"
        },
        {
          "category": "external",
          "summary": "RHBZ#496572",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1633",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1633"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633"
        }
      ],
      "release_date": "2009-04-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-07-14T19:11:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1157"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server"
    },
    {
      "cve": "CVE-2009-1961",
      "discovery_date": "2009-06-01T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "503474"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The inode double locking code in fs/ocfs2/file.c in the Linux kernel 2.6.30 before 2.6.30-rc3, 2.6.27 before 2.6.27.24, 2.6.29 before 2.6.29.4, and possibly other versions down to 2.6.19 allows local users to cause a denial of service (prevention of file creation and removal) via a series of splice system calls that trigger a deadlock between the generic_file_splice_write, splice_from_pipe, and ocfs2_file_splice_write functions.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: splice local denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise Linux MRG 2.\n\nThis issue was fixed in Red Hat Enterprise Linux MRG 1 via https://rhn.redhat.com/errata/RHSA-2009-1157.html.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1961"
        },
        {
          "category": "external",
          "summary": "RHBZ#503474",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503474"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1961",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1961"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1961",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1961"
        }
      ],
      "release_date": "2009-04-06T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-07-14T19:11:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1157"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: splice local denial of service"
    }
  ]
}
  RHSA-2009:1550
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix several security issues and multiple bugs\nare now available for Red Hat Enterprise Linux 3.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* when fput() was called to close a socket, the __scm_destroy() function in\nthe Linux kernel could make indirect recursive calls to itself. This could,\npotentially, lead to a denial of service issue. (CVE-2008-5029, Important)\n\n* the sendmsg() function in the Linux kernel did not block during UNIX\nsocket garbage collection. This could, potentially, lead to a local denial\nof service. (CVE-2008-5300, Important)\n\n* the exit_notify() function in the Linux kernel did not properly reset the\nexit signal if a process executed a set user ID (setuid) application before\nexiting. This could allow a local, unprivileged user to elevate their\nprivileges. (CVE-2009-1337, Important)\n\n* a flaw was found in the Intel PRO/1000 network driver in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service or code execution. (CVE-2009-1385,\nImportant)\n\n* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a\nsetuid or setgid program was executed. A local, unprivileged user could use\nthis flaw to bypass the mmap_min_addr protection mechanism and perform a\nNULL pointer dereference attack, or bypass the Address Space Layout\nRandomization (ASLR) security feature. (CVE-2009-1895, Important)\n\n* it was discovered that, when executing a new process, the clear_child_tid\npointer in the Linux kernel is not cleared. If this pointer points to a\nwritable portion of the memory of the new program, the kernel could corrupt\nfour bytes of memory, possibly leading to a local denial of service or\nprivilege escalation. (CVE-2009-2848, Important)\n\n* missing initialization flaws were found in getname() implementations in\nthe IrDA sockets, AppleTalk DDP protocol, NET/ROM protocol, and ROSE\nprotocol implementations in the Linux kernel. Certain data structures in\nthese getname() implementations were not initialized properly before being\ncopied to user-space. These flaws could lead to an information leak.\n(CVE-2009-3002, Important)\n\n* a NULL pointer dereference flaw was found in each of the following\nfunctions in the Linux kernel: pipe_read_open(), pipe_write_open(), and\npipe_rdwr_open(). When the mutex lock is not held, the i_pipe pointer could\nbe released by other processes before it is used to update the pipe\u0027s\nreader and writer counters. This could lead to a local denial of service or\nprivilege escalation. (CVE-2009-3547, Important)\n\nBug fixes:\n\n* this update adds the mmap_min_addr tunable and restriction checks to help\nprevent unprivileged users from creating new memory mappings below the\nminimum address. This can help prevent the exploitation of NULL pointer\ndereference bugs. Note that mmap_min_addr is set to zero (disabled) by\ndefault for backwards compatibility. (BZ#512642)\n\n* a bridge reference count problem in IPv6 has been fixed. (BZ#457010)\n\n* enforce null-termination of user-supplied arguments to setsockopt().\n(BZ#505514)\n\n* the gcc flag \"-fno-delete-null-pointer-checks\" was added to the kernel\nbuild options. This prevents gcc from optimizing out NULL pointer checks\nafter the first use of a pointer. NULL pointer bugs are often exploited by\nattackers. Keeping these checks is a safety measure. (BZ#511185)\n\n* a check has been added to the IPv4 code to make sure that rt is not NULL,\nto help prevent future bugs in functions that call ip_append_data() from\nbeing exploitable. (BZ#520300)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1550",
        "url": "https://access.redhat.com/errata/RHSA-2009:1550"
      },
      {
        "category": "external",
        "summary": "457010",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=457010"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-17866",
        "url": "http://kbase.redhat.com/faq/docs/DOC-17866"
      },
      {
        "category": "external",
        "summary": "470201",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470201"
      },
      {
        "category": "external",
        "summary": "473259",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=473259"
      },
      {
        "category": "external",
        "summary": "493771",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493771"
      },
      {
        "category": "external",
        "summary": "502981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
      },
      {
        "category": "external",
        "summary": "505514",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=505514"
      },
      {
        "category": "external",
        "summary": "511171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
      },
      {
        "category": "external",
        "summary": "511185",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511185"
      },
      {
        "category": "external",
        "summary": "512642",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512642"
      },
      {
        "category": "external",
        "summary": "515423",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515423"
      },
      {
        "category": "external",
        "summary": "519305",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519305"
      },
      {
        "category": "external",
        "summary": "520300",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=520300"
      },
      {
        "category": "external",
        "summary": "530490",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530490"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1550.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:13:02+00:00",
      "generator": {
        "date": "2025-10-09T13:13:02+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2009:1550",
      "initial_release_date": "2009-11-03T21:56:00+00:00",
      "revision_history": [
        {
          "date": "2009-11-03T21:56:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-11-03T16:59:47+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:13:02+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 3",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 3",
                  "product_id": "3AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:3::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Desktop version 3",
                "product": {
                  "name": "Red Hat Desktop version 3",
                  "product_id": "3Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 3",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 3",
                  "product_id": "3ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:3::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 3",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 3",
                  "product_id": "3WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-BOOT-0:2.4.21-63.EL.i386",
                "product": {
                  "name": "kernel-BOOT-0:2.4.21-63.EL.i386",
                  "product_id": "kernel-BOOT-0:2.4.21-63.EL.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-BOOT@2.4.21-63.EL?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-0:2.4.21-63.EL.i386",
                "product": {
                  "name": "kernel-source-0:2.4.21-63.EL.i386",
                  "product_id": "kernel-source-0:2.4.21-63.EL.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-source@2.4.21-63.EL?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.i386",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.i386",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.4.21-63.EL.i386",
                "product": {
                  "name": "kernel-doc-0:2.4.21-63.EL.i386",
                  "product_id": "kernel-doc-0:2.4.21-63.EL.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-63.EL?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-hugemem-0:2.4.21-63.EL.i686",
                "product": {
                  "name": "kernel-hugemem-0:2.4.21-63.EL.i686",
                  "product_id": "kernel-hugemem-0:2.4.21-63.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem@2.4.21-63.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.i686",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.i686",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-unsupported-0:2.4.21-63.EL.i686",
                "product": {
                  "name": "kernel-smp-unsupported-0:2.4.21-63.EL.i686",
                  "product_id": "kernel-smp-unsupported-0:2.4.21-63.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-63.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
                "product": {
                  "name": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
                  "product_id": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem-unsupported@2.4.21-63.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.i686",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.i686",
                  "product_id": "kernel-0:2.4.21-63.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.i686",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.4.21-63.EL.i686",
                "product": {
                  "name": "kernel-smp-0:2.4.21-63.EL.i686",
                  "product_id": "kernel-smp-0:2.4.21-63.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-63.EL?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.athlon",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.athlon",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=athlon"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
                "product": {
                  "name": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
                  "product_id": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-63.EL?arch=athlon"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.athlon",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.athlon",
                  "product_id": "kernel-0:2.4.21-63.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=athlon"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.athlon",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.athlon",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=athlon"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.4.21-63.EL.athlon",
                "product": {
                  "name": "kernel-smp-0:2.4.21-63.EL.athlon",
                  "product_id": "kernel-smp-0:2.4.21-63.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-63.EL?arch=athlon"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "athlon"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.ia64",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.ia64",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.ia64",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.ia64",
                  "product_id": "kernel-0:2.4.21-63.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-0:2.4.21-63.EL.ia64",
                "product": {
                  "name": "kernel-source-0:2.4.21-63.EL.ia64",
                  "product_id": "kernel-source-0:2.4.21-63.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-source@2.4.21-63.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.ia64",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.4.21-63.EL.ia64",
                "product": {
                  "name": "kernel-doc-0:2.4.21-63.EL.ia64",
                  "product_id": "kernel-doc-0:2.4.21-63.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-63.EL?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.ia32e",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.ia32e",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.ia32e",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=ia32e"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.ia32e",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.ia32e",
                  "product_id": "kernel-0:2.4.21-63.EL.ia32e",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=ia32e"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.ia32e",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.ia32e",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.ia32e",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=ia32e"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia32e"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.x86_64",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.x86_64",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
                "product": {
                  "name": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
                  "product_id": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-63.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.x86_64",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.x86_64",
                  "product_id": "kernel-0:2.4.21-63.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-0:2.4.21-63.EL.x86_64",
                "product": {
                  "name": "kernel-source-0:2.4.21-63.EL.x86_64",
                  "product_id": "kernel-source-0:2.4.21-63.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-source@2.4.21-63.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.x86_64",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.4.21-63.EL.x86_64",
                "product": {
                  "name": "kernel-smp-0:2.4.21-63.EL.x86_64",
                  "product_id": "kernel-smp-0:2.4.21-63.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-63.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.4.21-63.EL.x86_64",
                "product": {
                  "name": "kernel-doc-0:2.4.21-63.EL.x86_64",
                  "product_id": "kernel-doc-0:2.4.21-63.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-63.EL?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.src",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.src",
                  "product_id": "kernel-0:2.4.21-63.EL.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.s390x",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.s390x",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.s390x",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.s390x",
                  "product_id": "kernel-0:2.4.21-63.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-0:2.4.21-63.EL.s390x",
                "product": {
                  "name": "kernel-source-0:2.4.21-63.EL.s390x",
                  "product_id": "kernel-source-0:2.4.21-63.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-source@2.4.21-63.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.s390x",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.4.21-63.EL.s390x",
                "product": {
                  "name": "kernel-doc-0:2.4.21-63.EL.s390x",
                  "product_id": "kernel-doc-0:2.4.21-63.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-63.EL?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.s390",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.s390",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.s390",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.s390",
                  "product_id": "kernel-0:2.4.21-63.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-0:2.4.21-63.EL.s390",
                "product": {
                  "name": "kernel-source-0:2.4.21-63.EL.s390",
                  "product_id": "kernel-source-0:2.4.21-63.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-source@2.4.21-63.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.s390",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.s390",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.4.21-63.EL.s390",
                "product": {
                  "name": "kernel-doc-0:2.4.21-63.EL.s390",
                  "product_id": "kernel-doc-0:2.4.21-63.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-63.EL?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=ppc64pseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.ppc64pseries",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.ppc64pseries",
                  "product_id": "kernel-0:2.4.21-63.EL.ppc64pseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=ppc64pseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=ppc64pseries"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64pseries"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.ppc64iseries",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.ppc64iseries",
                  "product_id": "kernel-0:2.4.21-63.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=ppc64iseries"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64iseries"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-source-0:2.4.21-63.EL.ppc64",
                "product": {
                  "name": "kernel-source-0:2.4.21-63.EL.ppc64",
                  "product_id": "kernel-source-0:2.4.21-63.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-source@2.4.21-63.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.4.21-63.EL.ppc64",
                "product": {
                  "name": "kernel-doc-0:2.4.21-63.EL.ppc64",
                  "product_id": "kernel-doc-0:2.4.21-63.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-63.EL?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.src as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.src"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.src",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-BOOT-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-BOOT-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-BOOT-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-doc-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-doc-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-doc-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-doc-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-doc-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-doc-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-hugemem-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-smp-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-smp-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-smp-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-source-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-source-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-source-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-source-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-source-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-source-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.athlon as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.i686 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ia32e as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ia64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.s390 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.s390x as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.src as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.src"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.src",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-BOOT-0:2.4.21-63.EL.i386 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-BOOT-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.athlon as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.i386 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.i686 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ia32e as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ia64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.s390 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.s390x as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.i386 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-doc-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.ia64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.ppc64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.s390 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-doc-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.s390x as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.4.21-63.EL.i686 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.athlon as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.i686 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-smp-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.i386 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-source-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.ia64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-source-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.ppc64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.s390 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-source-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.s390x as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-source-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.athlon as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ia32e as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ia64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.s390 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.s390x as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.src as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.src"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.src",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-BOOT-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-BOOT-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-BOOT-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-doc-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-doc-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-doc-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-doc-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-doc-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-doc-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-hugemem-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-smp-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-smp-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-smp-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-source-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-source-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-source-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-source-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-source-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-source-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.src as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.src"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.src",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-BOOT-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-BOOT-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-BOOT-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-doc-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-doc-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-doc-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-doc-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-doc-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-doc-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-hugemem-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-smp-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-smp-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-smp-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-source-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-source-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-source-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-source-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-source-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-source-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3WS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2008-5029",
      "discovery_date": "2008-11-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "470201"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The __scm_destroy function in net/core/scm.c in the Linux kernel 2.6.27.4, 2.6.26, and earlier makes indirect recursive calls to itself through calls to the fput function, which allows local users to cause a denial of service (panic) via vectors related to sending an SCM_RIGHTS message through a UNIX domain socket and closing file descriptors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Unix sockets kernel panic",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:kernel-0:2.4.21-63.EL.athlon",
          "3AS:kernel-0:2.4.21-63.EL.i686",
          "3AS:kernel-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-0:2.4.21-63.EL.ia64",
          "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-0:2.4.21-63.EL.s390",
          "3AS:kernel-0:2.4.21-63.EL.s390x",
          "3AS:kernel-0:2.4.21-63.EL.src",
          "3AS:kernel-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-doc-0:2.4.21-63.EL.i386",
          "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-source-0:2.4.21-63.EL.i386",
          "3AS:kernel-source-0:2.4.21-63.EL.ia64",
          "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-source-0:2.4.21-63.EL.s390",
          "3AS:kernel-source-0:2.4.21-63.EL.s390x",
          "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-0:2.4.21-63.EL.src",
          "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-0:2.4.21-63.EL.athlon",
          "3ES:kernel-0:2.4.21-63.EL.i686",
          "3ES:kernel-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-0:2.4.21-63.EL.ia64",
          "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-0:2.4.21-63.EL.s390",
          "3ES:kernel-0:2.4.21-63.EL.s390x",
          "3ES:kernel-0:2.4.21-63.EL.src",
          "3ES:kernel-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-doc-0:2.4.21-63.EL.i386",
          "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
          "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
          "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-source-0:2.4.21-63.EL.i386",
          "3ES:kernel-source-0:2.4.21-63.EL.ia64",
          "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-source-0:2.4.21-63.EL.s390",
          "3ES:kernel-source-0:2.4.21-63.EL.s390x",
          "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-0:2.4.21-63.EL.athlon",
          "3WS:kernel-0:2.4.21-63.EL.i686",
          "3WS:kernel-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-0:2.4.21-63.EL.ia64",
          "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-0:2.4.21-63.EL.s390",
          "3WS:kernel-0:2.4.21-63.EL.s390x",
          "3WS:kernel-0:2.4.21-63.EL.src",
          "3WS:kernel-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-doc-0:2.4.21-63.EL.i386",
          "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-source-0:2.4.21-63.EL.i386",
          "3WS:kernel-source-0:2.4.21-63.EL.ia64",
          "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-source-0:2.4.21-63.EL.s390",
          "3WS:kernel-source-0:2.4.21-63.EL.s390x",
          "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-5029"
        },
        {
          "category": "external",
          "summary": "RHBZ#470201",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470201"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-5029",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-5029"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5029",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5029"
        }
      ],
      "release_date": "2008-11-06T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T21:56:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1550"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Unix sockets kernel panic"
    },
    {
      "cve": "CVE-2008-5300",
      "discovery_date": "2008-11-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "473259"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Linux kernel 2.6.28 allows local users to cause a denial of service (\"soft lockup\" and process loss) via a large number of sendmsg function calls, which does not block during AF_UNIX garbage collection and triggers an OOM condition, a different vulnerability than CVE-2008-5029.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: fix soft lockups/OOM issues with unix socket garbage collector",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:kernel-0:2.4.21-63.EL.athlon",
          "3AS:kernel-0:2.4.21-63.EL.i686",
          "3AS:kernel-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-0:2.4.21-63.EL.ia64",
          "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-0:2.4.21-63.EL.s390",
          "3AS:kernel-0:2.4.21-63.EL.s390x",
          "3AS:kernel-0:2.4.21-63.EL.src",
          "3AS:kernel-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-doc-0:2.4.21-63.EL.i386",
          "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-source-0:2.4.21-63.EL.i386",
          "3AS:kernel-source-0:2.4.21-63.EL.ia64",
          "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-source-0:2.4.21-63.EL.s390",
          "3AS:kernel-source-0:2.4.21-63.EL.s390x",
          "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-0:2.4.21-63.EL.src",
          "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-0:2.4.21-63.EL.athlon",
          "3ES:kernel-0:2.4.21-63.EL.i686",
          "3ES:kernel-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-0:2.4.21-63.EL.ia64",
          "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-0:2.4.21-63.EL.s390",
          "3ES:kernel-0:2.4.21-63.EL.s390x",
          "3ES:kernel-0:2.4.21-63.EL.src",
          "3ES:kernel-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-doc-0:2.4.21-63.EL.i386",
          "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
          "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
          "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-source-0:2.4.21-63.EL.i386",
          "3ES:kernel-source-0:2.4.21-63.EL.ia64",
          "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-source-0:2.4.21-63.EL.s390",
          "3ES:kernel-source-0:2.4.21-63.EL.s390x",
          "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-0:2.4.21-63.EL.athlon",
          "3WS:kernel-0:2.4.21-63.EL.i686",
          "3WS:kernel-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-0:2.4.21-63.EL.ia64",
          "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-0:2.4.21-63.EL.s390",
          "3WS:kernel-0:2.4.21-63.EL.s390x",
          "3WS:kernel-0:2.4.21-63.EL.src",
          "3WS:kernel-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-doc-0:2.4.21-63.EL.i386",
          "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-source-0:2.4.21-63.EL.i386",
          "3WS:kernel-source-0:2.4.21-63.EL.ia64",
          "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-source-0:2.4.21-63.EL.s390",
          "3WS:kernel-source-0:2.4.21-63.EL.s390x",
          "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-5300"
        },
        {
          "category": "external",
          "summary": "RHBZ#473259",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=473259"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-5300",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-5300"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5300",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5300"
        }
      ],
      "release_date": "2008-11-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T21:56:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1550"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: fix soft lockups/OOM issues with unix socket garbage collector"
    },
    {
      "cve": "CVE-2009-1337",
      "discovery_date": "2009-04-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "493771"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1 does not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies the exit_signal field and then uses an exec system call to launch a setuid application.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: exit_notify: kill the wrong capable(CAP_KILL) check",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:kernel-0:2.4.21-63.EL.athlon",
          "3AS:kernel-0:2.4.21-63.EL.i686",
          "3AS:kernel-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-0:2.4.21-63.EL.ia64",
          "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-0:2.4.21-63.EL.s390",
          "3AS:kernel-0:2.4.21-63.EL.s390x",
          "3AS:kernel-0:2.4.21-63.EL.src",
          "3AS:kernel-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-doc-0:2.4.21-63.EL.i386",
          "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-source-0:2.4.21-63.EL.i386",
          "3AS:kernel-source-0:2.4.21-63.EL.ia64",
          "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-source-0:2.4.21-63.EL.s390",
          "3AS:kernel-source-0:2.4.21-63.EL.s390x",
          "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-0:2.4.21-63.EL.src",
          "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-0:2.4.21-63.EL.athlon",
          "3ES:kernel-0:2.4.21-63.EL.i686",
          "3ES:kernel-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-0:2.4.21-63.EL.ia64",
          "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-0:2.4.21-63.EL.s390",
          "3ES:kernel-0:2.4.21-63.EL.s390x",
          "3ES:kernel-0:2.4.21-63.EL.src",
          "3ES:kernel-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-doc-0:2.4.21-63.EL.i386",
          "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
          "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
          "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-source-0:2.4.21-63.EL.i386",
          "3ES:kernel-source-0:2.4.21-63.EL.ia64",
          "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-source-0:2.4.21-63.EL.s390",
          "3ES:kernel-source-0:2.4.21-63.EL.s390x",
          "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-0:2.4.21-63.EL.athlon",
          "3WS:kernel-0:2.4.21-63.EL.i686",
          "3WS:kernel-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-0:2.4.21-63.EL.ia64",
          "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-0:2.4.21-63.EL.s390",
          "3WS:kernel-0:2.4.21-63.EL.s390x",
          "3WS:kernel-0:2.4.21-63.EL.src",
          "3WS:kernel-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-doc-0:2.4.21-63.EL.i386",
          "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-source-0:2.4.21-63.EL.i386",
          "3WS:kernel-source-0:2.4.21-63.EL.ia64",
          "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-source-0:2.4.21-63.EL.s390",
          "3WS:kernel-source-0:2.4.21-63.EL.s390x",
          "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1337"
        },
        {
          "category": "external",
          "summary": "RHBZ#493771",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493771"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1337",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1337"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1337",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1337"
        }
      ],
      "release_date": "2009-02-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T21:56:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1550"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: exit_notify: kill the wrong capable(CAP_KILL) check"
    },
    {
      "cve": "CVE-2009-1385",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-05-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "502981"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000_clean_rx_irq() denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:kernel-0:2.4.21-63.EL.athlon",
          "3AS:kernel-0:2.4.21-63.EL.i686",
          "3AS:kernel-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-0:2.4.21-63.EL.ia64",
          "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-0:2.4.21-63.EL.s390",
          "3AS:kernel-0:2.4.21-63.EL.s390x",
          "3AS:kernel-0:2.4.21-63.EL.src",
          "3AS:kernel-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-doc-0:2.4.21-63.EL.i386",
          "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-source-0:2.4.21-63.EL.i386",
          "3AS:kernel-source-0:2.4.21-63.EL.ia64",
          "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-source-0:2.4.21-63.EL.s390",
          "3AS:kernel-source-0:2.4.21-63.EL.s390x",
          "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-0:2.4.21-63.EL.src",
          "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-0:2.4.21-63.EL.athlon",
          "3ES:kernel-0:2.4.21-63.EL.i686",
          "3ES:kernel-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-0:2.4.21-63.EL.ia64",
          "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-0:2.4.21-63.EL.s390",
          "3ES:kernel-0:2.4.21-63.EL.s390x",
          "3ES:kernel-0:2.4.21-63.EL.src",
          "3ES:kernel-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-doc-0:2.4.21-63.EL.i386",
          "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
          "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
          "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-source-0:2.4.21-63.EL.i386",
          "3ES:kernel-source-0:2.4.21-63.EL.ia64",
          "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-source-0:2.4.21-63.EL.s390",
          "3ES:kernel-source-0:2.4.21-63.EL.s390x",
          "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-0:2.4.21-63.EL.athlon",
          "3WS:kernel-0:2.4.21-63.EL.i686",
          "3WS:kernel-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-0:2.4.21-63.EL.ia64",
          "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-0:2.4.21-63.EL.s390",
          "3WS:kernel-0:2.4.21-63.EL.s390x",
          "3WS:kernel-0:2.4.21-63.EL.src",
          "3WS:kernel-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-doc-0:2.4.21-63.EL.i386",
          "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-source-0:2.4.21-63.EL.i386",
          "3WS:kernel-source-0:2.4.21-63.EL.ia64",
          "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-source-0:2.4.21-63.EL.s390",
          "3WS:kernel-source-0:2.4.21-63.EL.s390x",
          "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "RHBZ#502981",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385"
        }
      ],
      "release_date": "2007-04-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T21:56:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1550"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000_clean_rx_irq() denial of service"
    },
    {
      "cve": "CVE-2009-1895",
      "discovery_date": "2009-06-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "511171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: personality: fix PER_CLEAR_ON_SETID",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:kernel-0:2.4.21-63.EL.athlon",
          "3AS:kernel-0:2.4.21-63.EL.i686",
          "3AS:kernel-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-0:2.4.21-63.EL.ia64",
          "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-0:2.4.21-63.EL.s390",
          "3AS:kernel-0:2.4.21-63.EL.s390x",
          "3AS:kernel-0:2.4.21-63.EL.src",
          "3AS:kernel-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-doc-0:2.4.21-63.EL.i386",
          "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-source-0:2.4.21-63.EL.i386",
          "3AS:kernel-source-0:2.4.21-63.EL.ia64",
          "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-source-0:2.4.21-63.EL.s390",
          "3AS:kernel-source-0:2.4.21-63.EL.s390x",
          "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-0:2.4.21-63.EL.src",
          "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-0:2.4.21-63.EL.athlon",
          "3ES:kernel-0:2.4.21-63.EL.i686",
          "3ES:kernel-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-0:2.4.21-63.EL.ia64",
          "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-0:2.4.21-63.EL.s390",
          "3ES:kernel-0:2.4.21-63.EL.s390x",
          "3ES:kernel-0:2.4.21-63.EL.src",
          "3ES:kernel-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-doc-0:2.4.21-63.EL.i386",
          "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
          "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
          "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-source-0:2.4.21-63.EL.i386",
          "3ES:kernel-source-0:2.4.21-63.EL.ia64",
          "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-source-0:2.4.21-63.EL.s390",
          "3ES:kernel-source-0:2.4.21-63.EL.s390x",
          "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-0:2.4.21-63.EL.athlon",
          "3WS:kernel-0:2.4.21-63.EL.i686",
          "3WS:kernel-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-0:2.4.21-63.EL.ia64",
          "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-0:2.4.21-63.EL.s390",
          "3WS:kernel-0:2.4.21-63.EL.s390x",
          "3WS:kernel-0:2.4.21-63.EL.src",
          "3WS:kernel-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-doc-0:2.4.21-63.EL.i386",
          "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-source-0:2.4.21-63.EL.i386",
          "3WS:kernel-source-0:2.4.21-63.EL.ia64",
          "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-source-0:2.4.21-63.EL.s390",
          "3WS:kernel-source-0:2.4.21-63.EL.s390x",
          "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "RHBZ#511171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1895",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895"
        }
      ],
      "release_date": "2009-06-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T21:56:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1550"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: personality: fix PER_CLEAR_ON_SETID"
    },
    {
      "cve": "CVE-2009-2848",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-08-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "515423"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current-\u003eclear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: execve: must clear current-\u003eclear_child_tid",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:kernel-0:2.4.21-63.EL.athlon",
          "3AS:kernel-0:2.4.21-63.EL.i686",
          "3AS:kernel-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-0:2.4.21-63.EL.ia64",
          "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-0:2.4.21-63.EL.s390",
          "3AS:kernel-0:2.4.21-63.EL.s390x",
          "3AS:kernel-0:2.4.21-63.EL.src",
          "3AS:kernel-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-doc-0:2.4.21-63.EL.i386",
          "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-source-0:2.4.21-63.EL.i386",
          "3AS:kernel-source-0:2.4.21-63.EL.ia64",
          "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-source-0:2.4.21-63.EL.s390",
          "3AS:kernel-source-0:2.4.21-63.EL.s390x",
          "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-0:2.4.21-63.EL.src",
          "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-0:2.4.21-63.EL.athlon",
          "3ES:kernel-0:2.4.21-63.EL.i686",
          "3ES:kernel-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-0:2.4.21-63.EL.ia64",
          "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-0:2.4.21-63.EL.s390",
          "3ES:kernel-0:2.4.21-63.EL.s390x",
          "3ES:kernel-0:2.4.21-63.EL.src",
          "3ES:kernel-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-doc-0:2.4.21-63.EL.i386",
          "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
          "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
          "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-source-0:2.4.21-63.EL.i386",
          "3ES:kernel-source-0:2.4.21-63.EL.ia64",
          "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-source-0:2.4.21-63.EL.s390",
          "3ES:kernel-source-0:2.4.21-63.EL.s390x",
          "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-0:2.4.21-63.EL.athlon",
          "3WS:kernel-0:2.4.21-63.EL.i686",
          "3WS:kernel-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-0:2.4.21-63.EL.ia64",
          "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-0:2.4.21-63.EL.s390",
          "3WS:kernel-0:2.4.21-63.EL.s390x",
          "3WS:kernel-0:2.4.21-63.EL.src",
          "3WS:kernel-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-doc-0:2.4.21-63.EL.i386",
          "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-source-0:2.4.21-63.EL.i386",
          "3WS:kernel-source-0:2.4.21-63.EL.ia64",
          "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-source-0:2.4.21-63.EL.s390",
          "3WS:kernel-source-0:2.4.21-63.EL.s390x",
          "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2848"
        },
        {
          "category": "external",
          "summary": "RHBZ#515423",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515423"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2848",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2848"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2848",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2848"
        }
      ],
      "release_date": "2009-07-31T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T21:56:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1550"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: execve: must clear current-\u003eclear_child_tid"
    },
    {
      "cve": "CVE-2009-3002",
      "discovery_date": "2009-08-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "519305"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Linux kernel before 2.6.31-rc7 does not initialize certain data structures within getname functions, which allows local users to read the contents of some kernel memory locations by calling getsockname on (1) an AF_APPLETALK socket, related to the atalk_getname function in net/appletalk/ddp.c; (2) an AF_IRDA socket, related to the irda_getname function in net/irda/af_irda.c; (3) an AF_ECONET socket, related to the econet_getname function in net/econet/af_econet.c; (4) an AF_NETROM socket, related to the nr_getname function in net/netrom/af_netrom.c; (5) an AF_ROSE socket, related to the rose_getname function in net/rose/af_rose.c; or (6) a raw CAN socket, related to the raw_getname function in net/can/raw.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: numerous getname() infoleaks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "CVE-2009-3002 describes a collection of similar information leaks that affect numerous networking protocols.\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4 and 5 did not enable support for the AppleTalk DDP protocol, and therefore were not affected by issue (1).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG did not enable support for IrDA sockets, and therefore were not affected by issue (2).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG did not enable support for the Acorn Econet and AUN protocols, and therefore were not affected by issue (3).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG did not enable support for the NET/ROM and ROSE protocols, and therefore were not affected by issues (4) and (5).\n\nThe raw_getname() leak was introduced in the Linux kernel version 2.6.25-rc1. The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG therefore were not affected by issue (6).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:kernel-0:2.4.21-63.EL.athlon",
          "3AS:kernel-0:2.4.21-63.EL.i686",
          "3AS:kernel-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-0:2.4.21-63.EL.ia64",
          "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-0:2.4.21-63.EL.s390",
          "3AS:kernel-0:2.4.21-63.EL.s390x",
          "3AS:kernel-0:2.4.21-63.EL.src",
          "3AS:kernel-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-doc-0:2.4.21-63.EL.i386",
          "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-source-0:2.4.21-63.EL.i386",
          "3AS:kernel-source-0:2.4.21-63.EL.ia64",
          "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-source-0:2.4.21-63.EL.s390",
          "3AS:kernel-source-0:2.4.21-63.EL.s390x",
          "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-0:2.4.21-63.EL.src",
          "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-0:2.4.21-63.EL.athlon",
          "3ES:kernel-0:2.4.21-63.EL.i686",
          "3ES:kernel-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-0:2.4.21-63.EL.ia64",
          "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-0:2.4.21-63.EL.s390",
          "3ES:kernel-0:2.4.21-63.EL.s390x",
          "3ES:kernel-0:2.4.21-63.EL.src",
          "3ES:kernel-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-doc-0:2.4.21-63.EL.i386",
          "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
          "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
          "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-source-0:2.4.21-63.EL.i386",
          "3ES:kernel-source-0:2.4.21-63.EL.ia64",
          "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-source-0:2.4.21-63.EL.s390",
          "3ES:kernel-source-0:2.4.21-63.EL.s390x",
          "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-0:2.4.21-63.EL.athlon",
          "3WS:kernel-0:2.4.21-63.EL.i686",
          "3WS:kernel-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-0:2.4.21-63.EL.ia64",
          "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-0:2.4.21-63.EL.s390",
          "3WS:kernel-0:2.4.21-63.EL.s390x",
          "3WS:kernel-0:2.4.21-63.EL.src",
          "3WS:kernel-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-doc-0:2.4.21-63.EL.i386",
          "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-source-0:2.4.21-63.EL.i386",
          "3WS:kernel-source-0:2.4.21-63.EL.ia64",
          "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-source-0:2.4.21-63.EL.s390",
          "3WS:kernel-source-0:2.4.21-63.EL.s390x",
          "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3002"
        },
        {
          "category": "external",
          "summary": "RHBZ#519305",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519305"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3002",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3002"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3002",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3002"
        }
      ],
      "release_date": "2009-08-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T21:56:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1550"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: numerous getname() infoleaks"
    },
    {
      "cve": "CVE-2009-3547",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "530490"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: fs: pipe.c null pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:kernel-0:2.4.21-63.EL.athlon",
          "3AS:kernel-0:2.4.21-63.EL.i686",
          "3AS:kernel-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-0:2.4.21-63.EL.ia64",
          "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-0:2.4.21-63.EL.s390",
          "3AS:kernel-0:2.4.21-63.EL.s390x",
          "3AS:kernel-0:2.4.21-63.EL.src",
          "3AS:kernel-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-doc-0:2.4.21-63.EL.i386",
          "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-source-0:2.4.21-63.EL.i386",
          "3AS:kernel-source-0:2.4.21-63.EL.ia64",
          "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-source-0:2.4.21-63.EL.s390",
          "3AS:kernel-source-0:2.4.21-63.EL.s390x",
          "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-0:2.4.21-63.EL.src",
          "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-0:2.4.21-63.EL.athlon",
          "3ES:kernel-0:2.4.21-63.EL.i686",
          "3ES:kernel-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-0:2.4.21-63.EL.ia64",
          "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-0:2.4.21-63.EL.s390",
          "3ES:kernel-0:2.4.21-63.EL.s390x",
          "3ES:kernel-0:2.4.21-63.EL.src",
          "3ES:kernel-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-doc-0:2.4.21-63.EL.i386",
          "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
          "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
          "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-source-0:2.4.21-63.EL.i386",
          "3ES:kernel-source-0:2.4.21-63.EL.ia64",
          "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-source-0:2.4.21-63.EL.s390",
          "3ES:kernel-source-0:2.4.21-63.EL.s390x",
          "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-0:2.4.21-63.EL.athlon",
          "3WS:kernel-0:2.4.21-63.EL.i686",
          "3WS:kernel-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-0:2.4.21-63.EL.ia64",
          "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-0:2.4.21-63.EL.s390",
          "3WS:kernel-0:2.4.21-63.EL.s390x",
          "3WS:kernel-0:2.4.21-63.EL.src",
          "3WS:kernel-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-doc-0:2.4.21-63.EL.i386",
          "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-source-0:2.4.21-63.EL.i386",
          "3WS:kernel-source-0:2.4.21-63.EL.ia64",
          "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-source-0:2.4.21-63.EL.s390",
          "3WS:kernel-source-0:2.4.21-63.EL.s390x",
          "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3547"
        },
        {
          "category": "external",
          "summary": "RHBZ#530490",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530490"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3547",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3547"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3547",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3547"
        }
      ],
      "release_date": "2009-10-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T21:56:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1550"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: fs: pipe.c null pointer dereference"
    }
  ]
}
  RHSA-2010:0079
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.2 Extended Update Support.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* a flaw was found in the IPv6 Extension Header (EH) handling\nimplementation in the Linux kernel. The skb-\u003edst data structure was not\nproperly validated in the ipv6_hop_jumbo() function. This could possibly\nlead to a remote denial of service. (CVE-2007-4567, Important)\n\n* the possibility of a timeout value overflow was found in the Linux kernel\nhigh-resolution timers functionality, hrtimers. This could allow a local,\nunprivileged user to execute arbitrary code, or cause a denial of service\n(kernel panic). (CVE-2007-5966, Important)\n\n* memory leaks were found on some error paths in the icmp_send()\nfunction in the Linux kernel. This could, potentially, cause the network\nconnectivity to cease. (CVE-2009-0778, Important)\n\n* a deficiency was found in the Linux kernel system call auditing\nimplementation on 64-bit systems. This could allow a local, unprivileged\nuser to circumvent a system call audit configuration, if that configuration\nfiltered based on the \"syscall\" number or arguments. (CVE-2009-0834,\nImportant)\n\n* a flaw was found in the Intel PRO/1000 Linux driver (e1000) in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service or code execution. (CVE-2009-1385,\nImportant)\n\n* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a\nsetuid or setgid program was executed. A local, unprivileged user could use\nthis flaw to bypass the mmap_min_addr protection mechanism and perform a\nNULL pointer dereference attack, or bypass the Address Space Layout\nRandomization (ASLR) security feature. (CVE-2009-1895, Important)\n\n* a flaw was found in each of the following Intel PRO/1000 Linux drivers in\nthe Linux kernel: e1000 and e1000e. A remote attacker using packets larger\nthan the MTU could bypass the existing fragment check, resulting in\npartial, invalid frames being passed to the network stack. These flaws\ncould also possibly be used to trigger a remote denial of service.\n(CVE-2009-4536, CVE-2009-4538, Important)\n\n* a flaw was found in the Realtek r8169 Ethernet driver in the Linux\nkernel. Receiving overly-long frames with a certain revision of the network\ncards supported by this driver could possibly result in a remote denial of\nservice. (CVE-2009-4537, Important)\n\nNote: This update also fixes several bugs. Documentation for these bug\nfixes will be available shortly from\nwww.redhat.com/docs/en-US/errata/RHSA-2010-0079/Kernel_Security_Update/\nindex.html\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0079",
        "url": "https://access.redhat.com/errata/RHSA-2010:0079"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "453135",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
      },
      {
        "category": "external",
        "summary": "485163",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=485163"
      },
      {
        "category": "external",
        "summary": "487990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
      },
      {
        "category": "external",
        "summary": "502981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
      },
      {
        "category": "external",
        "summary": "511171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
      },
      {
        "category": "external",
        "summary": "548074",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548074"
      },
      {
        "category": "external",
        "summary": "548641",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548641"
      },
      {
        "category": "external",
        "summary": "524179",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524179"
      },
      {
        "category": "external",
        "summary": "546226",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546226"
      },
      {
        "category": "external",
        "summary": "546227",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546227"
      },
      {
        "category": "external",
        "summary": "546228",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546228"
      },
      {
        "category": "external",
        "summary": "546229",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546229"
      },
      {
        "category": "external",
        "summary": "546230",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546230"
      },
      {
        "category": "external",
        "summary": "546231",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546231"
      },
      {
        "category": "external",
        "summary": "546232",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546232"
      },
      {
        "category": "external",
        "summary": "546233",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546233"
      },
      {
        "category": "external",
        "summary": "546234",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546234"
      },
      {
        "category": "external",
        "summary": "546236",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546236"
      },
      {
        "category": "external",
        "summary": "547299",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547299"
      },
      {
        "category": "external",
        "summary": "550907",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907"
      },
      {
        "category": "external",
        "summary": "551214",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214"
      },
      {
        "category": "external",
        "summary": "552126",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126"
      },
      {
        "category": "external",
        "summary": "553133",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=553133"
      },
      {
        "category": "external",
        "summary": "555052",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=555052"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0079.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:07:20+00:00",
      "generator": {
        "date": "2025-10-09T13:07:20+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2010:0079",
      "initial_release_date": "2010-02-02T21:01:00+00:00",
      "revision_history": [
        {
          "date": "2010-02-02T21:01:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-02-02T16:01:07+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:07:20+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux EUS (v. 5.2 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux EUS (v. 5.2 server)",
                  "product_id": "5Server-5.2.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:5.2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-xen-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-xen-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-PAE-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-PAE-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.i386",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.i386",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-xen-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.src",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.src",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.18-92.1.35.el5.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.18-92.1.35.el5.noarch",
                  "product_id": "kernel-doc-0:2.6.18-92.1.35.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-92.1.35.el5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.src as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.src",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-92.1.35.el5.noarch as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-92.1.35.el5.noarch",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.i386",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.ppc",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2007-4567",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-12-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "548641"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.22 does not properly validate the hop-by-hop IPv6 extended header, which allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted IPv6 packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ipv6_hop_jumbo remote system crash",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commit a11d206d that introduced the problem.\n\nThis upstream commit was backported in Red Hat Enterprise Linux 5 via RHBA-2008:0314. It was reported and addressed in Red Hat Enterprise Linux 5 via RHSA-2010:0019.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-4567"
        },
        {
          "category": "external",
          "summary": "RHBZ#548641",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548641"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4567",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-4567"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4567",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4567"
        }
      ],
      "release_date": "2007-09-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: ipv6_hop_jumbo remote system crash"
    },
    {
      "cve": "CVE-2007-5966",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2007-12-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "453135"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value.  NOTE: some of these details are obtained from third party information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: non-root can trigger cpu_idle soft lockup",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and 4.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-5966"
        },
        {
          "category": "external",
          "summary": "RHBZ#453135",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5966",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-5966"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966"
        }
      ],
      "release_date": "2007-12-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: non-root can trigger cpu_idle soft lockup"
    },
    {
      "cve": "CVE-2009-0778",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2009-02-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "485163"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The icmp_send function in net/ipv4/icmp.c in the Linux kernel before 2.6.25, when configured as a router with a REJECT route, does not properly manage the Protocol Independent Destination Cache (aka DST) in some situations involving transmission of an ICMP Host Unreachable message, which allows remote attackers to cause a denial of service (connectivity outage) by sending a large series of packets to many destination IP addresses within this REJECT route, related to an \"rt_cache leak.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: rt_cache leak leads to lack of network connectivity",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0778"
        },
        {
          "category": "external",
          "summary": "RHBZ#485163",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=485163"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0778",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0778"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0778",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0778"
        }
      ],
      "release_date": "2008-03-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: rt_cache leak leads to lack of network connectivity"
    },
    {
      "cve": "CVE-2009-0834",
      "discovery_date": "2009-03-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "487990"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86-64: syscall-audit: 32/64 syscall hole",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "RHBZ#487990",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0834",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834"
        }
      ],
      "release_date": "2009-02-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: x86-64: syscall-audit: 32/64 syscall hole"
    },
    {
      "cve": "CVE-2009-1385",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-05-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "502981"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000_clean_rx_irq() denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "RHBZ#502981",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385"
        }
      ],
      "release_date": "2007-04-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000_clean_rx_irq() denial of service"
    },
    {
      "cve": "CVE-2009-1895",
      "discovery_date": "2009-06-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "511171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: personality: fix PER_CLEAR_ON_SETID",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "RHBZ#511171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1895",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895"
        }
      ],
      "release_date": "2009-06-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: personality: fix PER_CLEAR_ON_SETID"
    },
    {
      "cve": "CVE-2009-4536",
      "discovery_date": "2009-12-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "552126"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000 issue reported at 26c3",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4536"
        },
        {
          "category": "external",
          "summary": "RHBZ#552126",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4536",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4536"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536"
        }
      ],
      "release_date": "2009-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000 issue reported at 26c3"
    },
    {
      "cve": "CVE-2009-4537",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-12-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "550907"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing \u0027\\0\u0027 characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r8169 issue reported at 26c3",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4537"
        },
        {
          "category": "external",
          "summary": "RHBZ#550907",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4537",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4537"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537"
        }
      ],
      "release_date": "2009-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: r8169 issue reported at 26c3"
    },
    {
      "cve": "CVE-2009-4538",
      "discovery_date": "2009-12-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "551214"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000e frame fragment issue",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4538"
        },
        {
          "category": "external",
          "summary": "RHBZ#551214",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4538",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4538"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538"
        }
      ],
      "release_date": "2009-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000e frame fragment issue"
    }
  ]
}
  RHSA-2009:1132
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix several security issues and various bugs\nare now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a flaw was found in the Intel PRO/1000 network driver in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service. (CVE-2009-1385, Important)\n\n* the Linux kernel Network File System daemon (nfsd) implementation did not\ndrop the CAP_MKNOD capability when handling requests from local,\nunprivileged users. This flaw could possibly lead to an information leak or\nprivilege escalation. (CVE-2009-1072, Moderate)\n\n* Frank Filz reported the NFSv4 client was missing a file permission check\nfor the execute bit in some situations. This could allow local,\nunprivileged users to run non-executable files on NFSv4 mounted file\nsystems. (CVE-2009-1630, Moderate)\n\n* a missing check was found in the hypervisor_callback() function in the\nLinux kernel provided by the kernel-xen package. This could cause a denial\nof service of a 32-bit guest if an application running in that guest\naccesses a certain memory location in the kernel. (CVE-2009-1758, Moderate)\n\n* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and\nagp_generic_alloc_pages() functions did not zero out the memory pages they\nallocate, which may later be available to user-space processes. This flaw\ncould possibly lead to an information leak. (CVE-2009-1192, Low)\n\nThese updated packages also fix the following bugs:\n\n* \"/proc/[pid]/maps\" and \"/proc/[pid]/smaps\" can only be read by processes\nable to use the ptrace() call on a given process; however, certain\ninformation from \"/proc/[pid]/stat\" and \"/proc/[pid]/wchan\" could be used\nto reconstruct memory maps, making it possible to bypass the Address Space\nLayout Randomization (ASLR) security feature. This update addresses this\nissue. (BZ#499549)\n\n* in some situations, the link count was not decreased when renaming unused\nfiles on NFS mounted file systems. This may have resulted in poor\nperformance. With this update, the link count is decreased in these\nsituations, the same as is done for other file operations, such as unlink\nand rmdir. (BZ#501802)\n\n* tcp_ack() cleared the probes_out variable even if there were outstanding\npackets. When low TCP keepalive intervals were used, this bug may have\ncaused problems, such as connections terminating, when using remote tools\nsuch as rsh and rlogin. (BZ#501754)\n\n* off-by-one errors in the time normalization code could have caused\nclock_gettime() to return one billion nanoseconds, rather than adding an\nextra second. This bug could have caused the name service cache daemon\n(nscd) to consume excessive CPU resources. (BZ#501800)\n\n* a system panic could occur when one thread read \"/proc/bus/input/devices\"\nwhile another was removing a device. With this update, a mutex has been\nadded to protect the input_dev_list and input_handler_list variables, which\nresolves this issue. (BZ#501804)\n\n* using netdump may have caused a kernel deadlock on some systems.\n(BZ#504565)\n\n* the file system mask, which lists capabilities for users with a file\nsystem user ID (fsuid) of 0, was missing the CAP_MKNOD and\nCAP_LINUX_IMMUTABLE capabilities. This could, potentially, allow users with\nan fsuid other than 0 to perform actions on some file system types that\nwould otherwise be prevented. This update adds these capabilities. (BZ#497269)\n\nAll Red Hat Enterprise Linux 4 users should upgrade to these updated\npackages, which contain backported patches to resolve these issues. Note:\nThe system must be rebooted for this update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1132",
        "url": "https://access.redhat.com/errata/RHSA-2009:1132"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "491572",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572"
      },
      {
        "category": "external",
        "summary": "497020",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020"
      },
      {
        "category": "external",
        "summary": "499549",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=499549"
      },
      {
        "category": "external",
        "summary": "500297",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297"
      },
      {
        "category": "external",
        "summary": "500945",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500945"
      },
      {
        "category": "external",
        "summary": "501754",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501754"
      },
      {
        "category": "external",
        "summary": "501800",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501800"
      },
      {
        "category": "external",
        "summary": "501802",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501802"
      },
      {
        "category": "external",
        "summary": "501804",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501804"
      },
      {
        "category": "external",
        "summary": "502981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
      },
      {
        "category": "external",
        "summary": "504565",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504565"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1132.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:17:12+00:00",
      "generator": {
        "date": "2025-10-09T13:17:12+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2009:1132",
      "initial_release_date": "2009-06-30T08:05:00+00:00",
      "revision_history": [
        {
          "date": "2009-06-30T08:05:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-06-30T04:06:02+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:17:12+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 4",
                  "product_id": "4AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop version 4",
                  "product_id": "4Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 4",
                  "product_id": "4ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 4",
                  "product_id": "4WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-smp-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-smp-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-xenU-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-xenU-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.3.EL.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.3.EL.ia64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.3.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.3.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.3.EL.ia64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.3.EL.ia64",
                  "product_id": "kernel-0:2.6.9-89.0.3.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.9-89.0.3.EL.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.9-89.0.3.EL.noarch",
                  "product_id": "kernel-doc-0:2.6.9-89.0.3.EL.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-89.0.3.EL?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.3.EL.src",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.3.EL.src",
                  "product_id": "kernel-0:2.6.9-89.0.3.EL.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.3.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.3.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.3.EL.ppc64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.3.EL.ppc64",
                  "product_id": "kernel-0:2.6.9-89.0.3.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
                  "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
                  "product_id": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=ppc64iseries"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64iseries"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390x",
                  "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.3.EL.s390x",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.3.EL.s390x",
                  "product_id": "kernel-0:2.6.9-89.0.3.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390",
                  "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.3.EL.s390",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.3.EL.s390",
                  "product_id": "kernel-0:2.6.9-89.0.3.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.src as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.src",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.3.EL.noarch as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.3.EL.noarch",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.src as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.src",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.3.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.3.EL.noarch",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.src as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.src",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.3.EL.noarch as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.3.EL.noarch",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.src as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.src",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.3.EL.noarch as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.3.EL.noarch",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-1072",
      "discovery_date": "2009-03-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "491572"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: nfsd should drop CAP_MKNOD for non-root",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 2.1 and 3, due to these products being in Production 3 of their maintenance life-cycles, where only qualified security errata of important or critical impact are addressed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.3.EL.src",
          "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.3.EL.src",
          "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.3.EL.src",
          "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1072"
        },
        {
          "category": "external",
          "summary": "RHBZ#491572",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1072",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1072"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072"
        }
      ],
      "release_date": "2009-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-06-30T08:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1132"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: nfsd should drop CAP_MKNOD for non-root"
    },
    {
      "cve": "CVE-2009-1192",
      "discovery_date": "2009-04-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "497020"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The (1) agp_generic_alloc_page and (2) agp_generic_alloc_pages functions in drivers/char/agp/generic.c in the agp subsystem in the Linux kernel before 2.6.30-rc3 do not zero out pages that may later be available to a user-space process, which allows local users to obtain sensitive information by reading these pages.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: agp: zero pages before sending to userspace",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.3.EL.src",
          "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.3.EL.src",
          "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.3.EL.src",
          "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1192"
        },
        {
          "category": "external",
          "summary": "RHBZ#497020",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1192",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1192"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192"
        }
      ],
      "release_date": "2009-04-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-06-30T08:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1132"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: agp: zero pages before sending to userspace"
    },
    {
      "cve": "CVE-2009-1385",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-05-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "502981"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000_clean_rx_irq() denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.3.EL.src",
          "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.3.EL.src",
          "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.3.EL.src",
          "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "RHBZ#502981",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385"
        }
      ],
      "release_date": "2007-04-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-06-30T08:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1132"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000_clean_rx_irq() denial of service"
    },
    {
      "cve": "CVE-2009-1630",
      "discovery_date": "2009-05-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "500297"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.3.EL.src",
          "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.3.EL.src",
          "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.3.EL.src",
          "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1630"
        },
        {
          "category": "external",
          "summary": "RHBZ#500297",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1630",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1630"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630"
        }
      ],
      "release_date": "2009-05-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-06-30T08:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1132"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission"
    },
    {
      "cve": "CVE-2009-1758",
      "discovery_date": "2009-05-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "500945"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The hypervisor_callback function in Xen, possibly before 3.4.0, as applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other versions allows guest user applications to cause a denial of service (kernel oops) of the guest OS by triggering a segmentation fault in \"certain address ranges.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: xen: local denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and Red Hat Enterprise MRG.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.3.EL.src",
          "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.3.EL.src",
          "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.3.EL.src",
          "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1758"
        },
        {
          "category": "external",
          "summary": "RHBZ#500945",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500945"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1758",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1758"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1758",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1758"
        }
      ],
      "release_date": "2009-05-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-06-30T08:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1132"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: xen: local denial of service"
    }
  ]
}
  rhsa-2009:1132
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix several security issues and various bugs\nare now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a flaw was found in the Intel PRO/1000 network driver in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service. (CVE-2009-1385, Important)\n\n* the Linux kernel Network File System daemon (nfsd) implementation did not\ndrop the CAP_MKNOD capability when handling requests from local,\nunprivileged users. This flaw could possibly lead to an information leak or\nprivilege escalation. (CVE-2009-1072, Moderate)\n\n* Frank Filz reported the NFSv4 client was missing a file permission check\nfor the execute bit in some situations. This could allow local,\nunprivileged users to run non-executable files on NFSv4 mounted file\nsystems. (CVE-2009-1630, Moderate)\n\n* a missing check was found in the hypervisor_callback() function in the\nLinux kernel provided by the kernel-xen package. This could cause a denial\nof service of a 32-bit guest if an application running in that guest\naccesses a certain memory location in the kernel. (CVE-2009-1758, Moderate)\n\n* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and\nagp_generic_alloc_pages() functions did not zero out the memory pages they\nallocate, which may later be available to user-space processes. This flaw\ncould possibly lead to an information leak. (CVE-2009-1192, Low)\n\nThese updated packages also fix the following bugs:\n\n* \"/proc/[pid]/maps\" and \"/proc/[pid]/smaps\" can only be read by processes\nable to use the ptrace() call on a given process; however, certain\ninformation from \"/proc/[pid]/stat\" and \"/proc/[pid]/wchan\" could be used\nto reconstruct memory maps, making it possible to bypass the Address Space\nLayout Randomization (ASLR) security feature. This update addresses this\nissue. (BZ#499549)\n\n* in some situations, the link count was not decreased when renaming unused\nfiles on NFS mounted file systems. This may have resulted in poor\nperformance. With this update, the link count is decreased in these\nsituations, the same as is done for other file operations, such as unlink\nand rmdir. (BZ#501802)\n\n* tcp_ack() cleared the probes_out variable even if there were outstanding\npackets. When low TCP keepalive intervals were used, this bug may have\ncaused problems, such as connections terminating, when using remote tools\nsuch as rsh and rlogin. (BZ#501754)\n\n* off-by-one errors in the time normalization code could have caused\nclock_gettime() to return one billion nanoseconds, rather than adding an\nextra second. This bug could have caused the name service cache daemon\n(nscd) to consume excessive CPU resources. (BZ#501800)\n\n* a system panic could occur when one thread read \"/proc/bus/input/devices\"\nwhile another was removing a device. With this update, a mutex has been\nadded to protect the input_dev_list and input_handler_list variables, which\nresolves this issue. (BZ#501804)\n\n* using netdump may have caused a kernel deadlock on some systems.\n(BZ#504565)\n\n* the file system mask, which lists capabilities for users with a file\nsystem user ID (fsuid) of 0, was missing the CAP_MKNOD and\nCAP_LINUX_IMMUTABLE capabilities. This could, potentially, allow users with\nan fsuid other than 0 to perform actions on some file system types that\nwould otherwise be prevented. This update adds these capabilities. (BZ#497269)\n\nAll Red Hat Enterprise Linux 4 users should upgrade to these updated\npackages, which contain backported patches to resolve these issues. Note:\nThe system must be rebooted for this update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1132",
        "url": "https://access.redhat.com/errata/RHSA-2009:1132"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "491572",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572"
      },
      {
        "category": "external",
        "summary": "497020",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020"
      },
      {
        "category": "external",
        "summary": "499549",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=499549"
      },
      {
        "category": "external",
        "summary": "500297",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297"
      },
      {
        "category": "external",
        "summary": "500945",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500945"
      },
      {
        "category": "external",
        "summary": "501754",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501754"
      },
      {
        "category": "external",
        "summary": "501800",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501800"
      },
      {
        "category": "external",
        "summary": "501802",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501802"
      },
      {
        "category": "external",
        "summary": "501804",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501804"
      },
      {
        "category": "external",
        "summary": "502981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
      },
      {
        "category": "external",
        "summary": "504565",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504565"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1132.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:17:12+00:00",
      "generator": {
        "date": "2025-10-09T13:17:12+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2009:1132",
      "initial_release_date": "2009-06-30T08:05:00+00:00",
      "revision_history": [
        {
          "date": "2009-06-30T08:05:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-06-30T04:06:02+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:17:12+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 4",
                  "product_id": "4AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop version 4",
                  "product_id": "4Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 4",
                  "product_id": "4ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 4",
                  "product_id": "4WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-smp-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-smp-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-xenU-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-xenU-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.3.EL.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.3.EL.ia64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.3.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.3.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.3.EL.ia64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.3.EL.ia64",
                  "product_id": "kernel-0:2.6.9-89.0.3.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.9-89.0.3.EL.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.9-89.0.3.EL.noarch",
                  "product_id": "kernel-doc-0:2.6.9-89.0.3.EL.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-89.0.3.EL?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.3.EL.src",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.3.EL.src",
                  "product_id": "kernel-0:2.6.9-89.0.3.EL.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.3.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.3.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.3.EL.ppc64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.3.EL.ppc64",
                  "product_id": "kernel-0:2.6.9-89.0.3.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
                  "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
                  "product_id": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=ppc64iseries"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64iseries"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390x",
                  "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.3.EL.s390x",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.3.EL.s390x",
                  "product_id": "kernel-0:2.6.9-89.0.3.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390",
                  "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.3.EL.s390",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.3.EL.s390",
                  "product_id": "kernel-0:2.6.9-89.0.3.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.src as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.src",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.3.EL.noarch as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.3.EL.noarch",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.src as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.src",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.3.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.3.EL.noarch",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.src as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.src",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.3.EL.noarch as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.3.EL.noarch",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.src as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.src",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.3.EL.noarch as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.3.EL.noarch",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-1072",
      "discovery_date": "2009-03-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "491572"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: nfsd should drop CAP_MKNOD for non-root",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 2.1 and 3, due to these products being in Production 3 of their maintenance life-cycles, where only qualified security errata of important or critical impact are addressed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.3.EL.src",
          "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.3.EL.src",
          "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.3.EL.src",
          "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1072"
        },
        {
          "category": "external",
          "summary": "RHBZ#491572",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1072",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1072"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072"
        }
      ],
      "release_date": "2009-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-06-30T08:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1132"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: nfsd should drop CAP_MKNOD for non-root"
    },
    {
      "cve": "CVE-2009-1192",
      "discovery_date": "2009-04-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "497020"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The (1) agp_generic_alloc_page and (2) agp_generic_alloc_pages functions in drivers/char/agp/generic.c in the agp subsystem in the Linux kernel before 2.6.30-rc3 do not zero out pages that may later be available to a user-space process, which allows local users to obtain sensitive information by reading these pages.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: agp: zero pages before sending to userspace",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.3.EL.src",
          "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.3.EL.src",
          "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.3.EL.src",
          "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1192"
        },
        {
          "category": "external",
          "summary": "RHBZ#497020",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1192",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1192"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192"
        }
      ],
      "release_date": "2009-04-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-06-30T08:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1132"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: agp: zero pages before sending to userspace"
    },
    {
      "cve": "CVE-2009-1385",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-05-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "502981"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000_clean_rx_irq() denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.3.EL.src",
          "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.3.EL.src",
          "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.3.EL.src",
          "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "RHBZ#502981",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385"
        }
      ],
      "release_date": "2007-04-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-06-30T08:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1132"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000_clean_rx_irq() denial of service"
    },
    {
      "cve": "CVE-2009-1630",
      "discovery_date": "2009-05-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "500297"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.3.EL.src",
          "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.3.EL.src",
          "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.3.EL.src",
          "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1630"
        },
        {
          "category": "external",
          "summary": "RHBZ#500297",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1630",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1630"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630"
        }
      ],
      "release_date": "2009-05-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-06-30T08:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1132"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission"
    },
    {
      "cve": "CVE-2009-1758",
      "discovery_date": "2009-05-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "500945"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The hypervisor_callback function in Xen, possibly before 3.4.0, as applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other versions allows guest user applications to cause a denial of service (kernel oops) of the guest OS by triggering a segmentation fault in \"certain address ranges.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: xen: local denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and Red Hat Enterprise MRG.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.3.EL.src",
          "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.3.EL.src",
          "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.3.EL.src",
          "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1758"
        },
        {
          "category": "external",
          "summary": "RHBZ#500945",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500945"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1758",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1758"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1758",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1758"
        }
      ],
      "release_date": "2009-05-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-06-30T08:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1132"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: xen: local denial of service"
    }
  ]
}
  rhsa-2010:0079
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.2 Extended Update Support.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* a flaw was found in the IPv6 Extension Header (EH) handling\nimplementation in the Linux kernel. The skb-\u003edst data structure was not\nproperly validated in the ipv6_hop_jumbo() function. This could possibly\nlead to a remote denial of service. (CVE-2007-4567, Important)\n\n* the possibility of a timeout value overflow was found in the Linux kernel\nhigh-resolution timers functionality, hrtimers. This could allow a local,\nunprivileged user to execute arbitrary code, or cause a denial of service\n(kernel panic). (CVE-2007-5966, Important)\n\n* memory leaks were found on some error paths in the icmp_send()\nfunction in the Linux kernel. This could, potentially, cause the network\nconnectivity to cease. (CVE-2009-0778, Important)\n\n* a deficiency was found in the Linux kernel system call auditing\nimplementation on 64-bit systems. This could allow a local, unprivileged\nuser to circumvent a system call audit configuration, if that configuration\nfiltered based on the \"syscall\" number or arguments. (CVE-2009-0834,\nImportant)\n\n* a flaw was found in the Intel PRO/1000 Linux driver (e1000) in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service or code execution. (CVE-2009-1385,\nImportant)\n\n* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a\nsetuid or setgid program was executed. A local, unprivileged user could use\nthis flaw to bypass the mmap_min_addr protection mechanism and perform a\nNULL pointer dereference attack, or bypass the Address Space Layout\nRandomization (ASLR) security feature. (CVE-2009-1895, Important)\n\n* a flaw was found in each of the following Intel PRO/1000 Linux drivers in\nthe Linux kernel: e1000 and e1000e. A remote attacker using packets larger\nthan the MTU could bypass the existing fragment check, resulting in\npartial, invalid frames being passed to the network stack. These flaws\ncould also possibly be used to trigger a remote denial of service.\n(CVE-2009-4536, CVE-2009-4538, Important)\n\n* a flaw was found in the Realtek r8169 Ethernet driver in the Linux\nkernel. Receiving overly-long frames with a certain revision of the network\ncards supported by this driver could possibly result in a remote denial of\nservice. (CVE-2009-4537, Important)\n\nNote: This update also fixes several bugs. Documentation for these bug\nfixes will be available shortly from\nwww.redhat.com/docs/en-US/errata/RHSA-2010-0079/Kernel_Security_Update/\nindex.html\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0079",
        "url": "https://access.redhat.com/errata/RHSA-2010:0079"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "453135",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
      },
      {
        "category": "external",
        "summary": "485163",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=485163"
      },
      {
        "category": "external",
        "summary": "487990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
      },
      {
        "category": "external",
        "summary": "502981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
      },
      {
        "category": "external",
        "summary": "511171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
      },
      {
        "category": "external",
        "summary": "548074",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548074"
      },
      {
        "category": "external",
        "summary": "548641",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548641"
      },
      {
        "category": "external",
        "summary": "524179",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524179"
      },
      {
        "category": "external",
        "summary": "546226",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546226"
      },
      {
        "category": "external",
        "summary": "546227",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546227"
      },
      {
        "category": "external",
        "summary": "546228",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546228"
      },
      {
        "category": "external",
        "summary": "546229",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546229"
      },
      {
        "category": "external",
        "summary": "546230",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546230"
      },
      {
        "category": "external",
        "summary": "546231",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546231"
      },
      {
        "category": "external",
        "summary": "546232",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546232"
      },
      {
        "category": "external",
        "summary": "546233",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546233"
      },
      {
        "category": "external",
        "summary": "546234",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546234"
      },
      {
        "category": "external",
        "summary": "546236",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546236"
      },
      {
        "category": "external",
        "summary": "547299",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547299"
      },
      {
        "category": "external",
        "summary": "550907",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907"
      },
      {
        "category": "external",
        "summary": "551214",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214"
      },
      {
        "category": "external",
        "summary": "552126",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126"
      },
      {
        "category": "external",
        "summary": "553133",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=553133"
      },
      {
        "category": "external",
        "summary": "555052",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=555052"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0079.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:07:20+00:00",
      "generator": {
        "date": "2025-10-09T13:07:20+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2010:0079",
      "initial_release_date": "2010-02-02T21:01:00+00:00",
      "revision_history": [
        {
          "date": "2010-02-02T21:01:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-02-02T16:01:07+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:07:20+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux EUS (v. 5.2 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux EUS (v. 5.2 server)",
                  "product_id": "5Server-5.2.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:5.2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-xen-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-xen-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-PAE-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-PAE-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.i386",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.i386",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-xen-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.src",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.src",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.18-92.1.35.el5.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.18-92.1.35.el5.noarch",
                  "product_id": "kernel-doc-0:2.6.18-92.1.35.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-92.1.35.el5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.src as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.src",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-92.1.35.el5.noarch as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-92.1.35.el5.noarch",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.i386",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.ppc",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2007-4567",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-12-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "548641"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.22 does not properly validate the hop-by-hop IPv6 extended header, which allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted IPv6 packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ipv6_hop_jumbo remote system crash",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commit a11d206d that introduced the problem.\n\nThis upstream commit was backported in Red Hat Enterprise Linux 5 via RHBA-2008:0314. It was reported and addressed in Red Hat Enterprise Linux 5 via RHSA-2010:0019.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-4567"
        },
        {
          "category": "external",
          "summary": "RHBZ#548641",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548641"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4567",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-4567"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4567",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4567"
        }
      ],
      "release_date": "2007-09-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: ipv6_hop_jumbo remote system crash"
    },
    {
      "cve": "CVE-2007-5966",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2007-12-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "453135"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value.  NOTE: some of these details are obtained from third party information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: non-root can trigger cpu_idle soft lockup",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and 4.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-5966"
        },
        {
          "category": "external",
          "summary": "RHBZ#453135",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5966",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-5966"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966"
        }
      ],
      "release_date": "2007-12-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: non-root can trigger cpu_idle soft lockup"
    },
    {
      "cve": "CVE-2009-0778",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2009-02-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "485163"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The icmp_send function in net/ipv4/icmp.c in the Linux kernel before 2.6.25, when configured as a router with a REJECT route, does not properly manage the Protocol Independent Destination Cache (aka DST) in some situations involving transmission of an ICMP Host Unreachable message, which allows remote attackers to cause a denial of service (connectivity outage) by sending a large series of packets to many destination IP addresses within this REJECT route, related to an \"rt_cache leak.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: rt_cache leak leads to lack of network connectivity",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0778"
        },
        {
          "category": "external",
          "summary": "RHBZ#485163",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=485163"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0778",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0778"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0778",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0778"
        }
      ],
      "release_date": "2008-03-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: rt_cache leak leads to lack of network connectivity"
    },
    {
      "cve": "CVE-2009-0834",
      "discovery_date": "2009-03-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "487990"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86-64: syscall-audit: 32/64 syscall hole",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "RHBZ#487990",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0834",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834"
        }
      ],
      "release_date": "2009-02-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: x86-64: syscall-audit: 32/64 syscall hole"
    },
    {
      "cve": "CVE-2009-1385",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-05-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "502981"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000_clean_rx_irq() denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "RHBZ#502981",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385"
        }
      ],
      "release_date": "2007-04-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000_clean_rx_irq() denial of service"
    },
    {
      "cve": "CVE-2009-1895",
      "discovery_date": "2009-06-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "511171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: personality: fix PER_CLEAR_ON_SETID",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "RHBZ#511171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1895",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895"
        }
      ],
      "release_date": "2009-06-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: personality: fix PER_CLEAR_ON_SETID"
    },
    {
      "cve": "CVE-2009-4536",
      "discovery_date": "2009-12-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "552126"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000 issue reported at 26c3",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4536"
        },
        {
          "category": "external",
          "summary": "RHBZ#552126",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4536",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4536"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536"
        }
      ],
      "release_date": "2009-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000 issue reported at 26c3"
    },
    {
      "cve": "CVE-2009-4537",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-12-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "550907"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing \u0027\\0\u0027 characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r8169 issue reported at 26c3",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4537"
        },
        {
          "category": "external",
          "summary": "RHBZ#550907",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4537",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4537"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537"
        }
      ],
      "release_date": "2009-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: r8169 issue reported at 26c3"
    },
    {
      "cve": "CVE-2009-4538",
      "discovery_date": "2009-12-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "551214"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000e frame fragment issue",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4538"
        },
        {
          "category": "external",
          "summary": "RHBZ#551214",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4538",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4538"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538"
        }
      ],
      "release_date": "2009-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000e frame fragment issue"
    }
  ]
}
  rhsa-2009:1550
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix several security issues and multiple bugs\nare now available for Red Hat Enterprise Linux 3.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* when fput() was called to close a socket, the __scm_destroy() function in\nthe Linux kernel could make indirect recursive calls to itself. This could,\npotentially, lead to a denial of service issue. (CVE-2008-5029, Important)\n\n* the sendmsg() function in the Linux kernel did not block during UNIX\nsocket garbage collection. This could, potentially, lead to a local denial\nof service. (CVE-2008-5300, Important)\n\n* the exit_notify() function in the Linux kernel did not properly reset the\nexit signal if a process executed a set user ID (setuid) application before\nexiting. This could allow a local, unprivileged user to elevate their\nprivileges. (CVE-2009-1337, Important)\n\n* a flaw was found in the Intel PRO/1000 network driver in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service or code execution. (CVE-2009-1385,\nImportant)\n\n* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a\nsetuid or setgid program was executed. A local, unprivileged user could use\nthis flaw to bypass the mmap_min_addr protection mechanism and perform a\nNULL pointer dereference attack, or bypass the Address Space Layout\nRandomization (ASLR) security feature. (CVE-2009-1895, Important)\n\n* it was discovered that, when executing a new process, the clear_child_tid\npointer in the Linux kernel is not cleared. If this pointer points to a\nwritable portion of the memory of the new program, the kernel could corrupt\nfour bytes of memory, possibly leading to a local denial of service or\nprivilege escalation. (CVE-2009-2848, Important)\n\n* missing initialization flaws were found in getname() implementations in\nthe IrDA sockets, AppleTalk DDP protocol, NET/ROM protocol, and ROSE\nprotocol implementations in the Linux kernel. Certain data structures in\nthese getname() implementations were not initialized properly before being\ncopied to user-space. These flaws could lead to an information leak.\n(CVE-2009-3002, Important)\n\n* a NULL pointer dereference flaw was found in each of the following\nfunctions in the Linux kernel: pipe_read_open(), pipe_write_open(), and\npipe_rdwr_open(). When the mutex lock is not held, the i_pipe pointer could\nbe released by other processes before it is used to update the pipe\u0027s\nreader and writer counters. This could lead to a local denial of service or\nprivilege escalation. (CVE-2009-3547, Important)\n\nBug fixes:\n\n* this update adds the mmap_min_addr tunable and restriction checks to help\nprevent unprivileged users from creating new memory mappings below the\nminimum address. This can help prevent the exploitation of NULL pointer\ndereference bugs. Note that mmap_min_addr is set to zero (disabled) by\ndefault for backwards compatibility. (BZ#512642)\n\n* a bridge reference count problem in IPv6 has been fixed. (BZ#457010)\n\n* enforce null-termination of user-supplied arguments to setsockopt().\n(BZ#505514)\n\n* the gcc flag \"-fno-delete-null-pointer-checks\" was added to the kernel\nbuild options. This prevents gcc from optimizing out NULL pointer checks\nafter the first use of a pointer. NULL pointer bugs are often exploited by\nattackers. Keeping these checks is a safety measure. (BZ#511185)\n\n* a check has been added to the IPv4 code to make sure that rt is not NULL,\nto help prevent future bugs in functions that call ip_append_data() from\nbeing exploitable. (BZ#520300)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1550",
        "url": "https://access.redhat.com/errata/RHSA-2009:1550"
      },
      {
        "category": "external",
        "summary": "457010",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=457010"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-17866",
        "url": "http://kbase.redhat.com/faq/docs/DOC-17866"
      },
      {
        "category": "external",
        "summary": "470201",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470201"
      },
      {
        "category": "external",
        "summary": "473259",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=473259"
      },
      {
        "category": "external",
        "summary": "493771",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493771"
      },
      {
        "category": "external",
        "summary": "502981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
      },
      {
        "category": "external",
        "summary": "505514",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=505514"
      },
      {
        "category": "external",
        "summary": "511171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
      },
      {
        "category": "external",
        "summary": "511185",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511185"
      },
      {
        "category": "external",
        "summary": "512642",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512642"
      },
      {
        "category": "external",
        "summary": "515423",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515423"
      },
      {
        "category": "external",
        "summary": "519305",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519305"
      },
      {
        "category": "external",
        "summary": "520300",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=520300"
      },
      {
        "category": "external",
        "summary": "530490",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530490"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1550.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:13:02+00:00",
      "generator": {
        "date": "2025-10-09T13:13:02+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2009:1550",
      "initial_release_date": "2009-11-03T21:56:00+00:00",
      "revision_history": [
        {
          "date": "2009-11-03T21:56:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-11-03T16:59:47+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:13:02+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 3",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 3",
                  "product_id": "3AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:3::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Desktop version 3",
                "product": {
                  "name": "Red Hat Desktop version 3",
                  "product_id": "3Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 3",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 3",
                  "product_id": "3ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:3::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 3",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 3",
                  "product_id": "3WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-BOOT-0:2.4.21-63.EL.i386",
                "product": {
                  "name": "kernel-BOOT-0:2.4.21-63.EL.i386",
                  "product_id": "kernel-BOOT-0:2.4.21-63.EL.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-BOOT@2.4.21-63.EL?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-0:2.4.21-63.EL.i386",
                "product": {
                  "name": "kernel-source-0:2.4.21-63.EL.i386",
                  "product_id": "kernel-source-0:2.4.21-63.EL.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-source@2.4.21-63.EL?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.i386",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.i386",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.4.21-63.EL.i386",
                "product": {
                  "name": "kernel-doc-0:2.4.21-63.EL.i386",
                  "product_id": "kernel-doc-0:2.4.21-63.EL.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-63.EL?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-hugemem-0:2.4.21-63.EL.i686",
                "product": {
                  "name": "kernel-hugemem-0:2.4.21-63.EL.i686",
                  "product_id": "kernel-hugemem-0:2.4.21-63.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem@2.4.21-63.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.i686",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.i686",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-unsupported-0:2.4.21-63.EL.i686",
                "product": {
                  "name": "kernel-smp-unsupported-0:2.4.21-63.EL.i686",
                  "product_id": "kernel-smp-unsupported-0:2.4.21-63.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-63.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
                "product": {
                  "name": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
                  "product_id": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem-unsupported@2.4.21-63.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.i686",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.i686",
                  "product_id": "kernel-0:2.4.21-63.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.i686",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.4.21-63.EL.i686",
                "product": {
                  "name": "kernel-smp-0:2.4.21-63.EL.i686",
                  "product_id": "kernel-smp-0:2.4.21-63.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-63.EL?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.athlon",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.athlon",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=athlon"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
                "product": {
                  "name": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
                  "product_id": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-63.EL?arch=athlon"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.athlon",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.athlon",
                  "product_id": "kernel-0:2.4.21-63.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=athlon"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.athlon",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.athlon",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=athlon"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.4.21-63.EL.athlon",
                "product": {
                  "name": "kernel-smp-0:2.4.21-63.EL.athlon",
                  "product_id": "kernel-smp-0:2.4.21-63.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-63.EL?arch=athlon"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "athlon"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.ia64",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.ia64",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.ia64",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.ia64",
                  "product_id": "kernel-0:2.4.21-63.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-0:2.4.21-63.EL.ia64",
                "product": {
                  "name": "kernel-source-0:2.4.21-63.EL.ia64",
                  "product_id": "kernel-source-0:2.4.21-63.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-source@2.4.21-63.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.ia64",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.4.21-63.EL.ia64",
                "product": {
                  "name": "kernel-doc-0:2.4.21-63.EL.ia64",
                  "product_id": "kernel-doc-0:2.4.21-63.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-63.EL?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.ia32e",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.ia32e",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.ia32e",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=ia32e"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.ia32e",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.ia32e",
                  "product_id": "kernel-0:2.4.21-63.EL.ia32e",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=ia32e"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.ia32e",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.ia32e",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.ia32e",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=ia32e"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia32e"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.x86_64",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.x86_64",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
                "product": {
                  "name": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
                  "product_id": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-63.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.x86_64",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.x86_64",
                  "product_id": "kernel-0:2.4.21-63.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-0:2.4.21-63.EL.x86_64",
                "product": {
                  "name": "kernel-source-0:2.4.21-63.EL.x86_64",
                  "product_id": "kernel-source-0:2.4.21-63.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-source@2.4.21-63.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.x86_64",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.4.21-63.EL.x86_64",
                "product": {
                  "name": "kernel-smp-0:2.4.21-63.EL.x86_64",
                  "product_id": "kernel-smp-0:2.4.21-63.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-63.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.4.21-63.EL.x86_64",
                "product": {
                  "name": "kernel-doc-0:2.4.21-63.EL.x86_64",
                  "product_id": "kernel-doc-0:2.4.21-63.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-63.EL?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.src",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.src",
                  "product_id": "kernel-0:2.4.21-63.EL.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.s390x",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.s390x",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.s390x",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.s390x",
                  "product_id": "kernel-0:2.4.21-63.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-0:2.4.21-63.EL.s390x",
                "product": {
                  "name": "kernel-source-0:2.4.21-63.EL.s390x",
                  "product_id": "kernel-source-0:2.4.21-63.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-source@2.4.21-63.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.s390x",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.4.21-63.EL.s390x",
                "product": {
                  "name": "kernel-doc-0:2.4.21-63.EL.s390x",
                  "product_id": "kernel-doc-0:2.4.21-63.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-63.EL?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.s390",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.s390",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.s390",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.s390",
                  "product_id": "kernel-0:2.4.21-63.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-0:2.4.21-63.EL.s390",
                "product": {
                  "name": "kernel-source-0:2.4.21-63.EL.s390",
                  "product_id": "kernel-source-0:2.4.21-63.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-source@2.4.21-63.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.s390",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.s390",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.4.21-63.EL.s390",
                "product": {
                  "name": "kernel-doc-0:2.4.21-63.EL.s390",
                  "product_id": "kernel-doc-0:2.4.21-63.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-63.EL?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=ppc64pseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.ppc64pseries",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.ppc64pseries",
                  "product_id": "kernel-0:2.4.21-63.EL.ppc64pseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=ppc64pseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=ppc64pseries"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64pseries"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.ppc64iseries",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.ppc64iseries",
                  "product_id": "kernel-0:2.4.21-63.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=ppc64iseries"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64iseries"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-source-0:2.4.21-63.EL.ppc64",
                "product": {
                  "name": "kernel-source-0:2.4.21-63.EL.ppc64",
                  "product_id": "kernel-source-0:2.4.21-63.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-source@2.4.21-63.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.4.21-63.EL.ppc64",
                "product": {
                  "name": "kernel-doc-0:2.4.21-63.EL.ppc64",
                  "product_id": "kernel-doc-0:2.4.21-63.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-63.EL?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.src as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.src"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.src",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-BOOT-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-BOOT-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-BOOT-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-doc-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-doc-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-doc-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-doc-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-doc-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-doc-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-hugemem-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-smp-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-smp-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-smp-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-source-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-source-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-source-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-source-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-source-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-source-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.athlon as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.i686 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ia32e as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ia64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.s390 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.s390x as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.src as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.src"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.src",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-BOOT-0:2.4.21-63.EL.i386 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-BOOT-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.athlon as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.i386 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.i686 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ia32e as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ia64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.s390 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.s390x as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.i386 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-doc-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.ia64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.ppc64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.s390 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-doc-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.s390x as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.4.21-63.EL.i686 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.athlon as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.i686 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-smp-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.i386 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-source-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.ia64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-source-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.ppc64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.s390 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-source-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.s390x as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-source-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.athlon as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ia32e as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ia64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.s390 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.s390x as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.src as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.src"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.src",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-BOOT-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-BOOT-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-BOOT-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-doc-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-doc-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-doc-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-doc-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-doc-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-doc-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-hugemem-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-smp-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-smp-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-smp-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-source-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-source-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-source-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-source-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-source-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-source-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.src as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.src"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.src",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-BOOT-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-BOOT-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-BOOT-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-doc-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-doc-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-doc-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-doc-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-doc-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-doc-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-hugemem-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-smp-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-smp-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-smp-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-source-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-source-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-source-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-source-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-source-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-source-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3WS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2008-5029",
      "discovery_date": "2008-11-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "470201"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The __scm_destroy function in net/core/scm.c in the Linux kernel 2.6.27.4, 2.6.26, and earlier makes indirect recursive calls to itself through calls to the fput function, which allows local users to cause a denial of service (panic) via vectors related to sending an SCM_RIGHTS message through a UNIX domain socket and closing file descriptors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Unix sockets kernel panic",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:kernel-0:2.4.21-63.EL.athlon",
          "3AS:kernel-0:2.4.21-63.EL.i686",
          "3AS:kernel-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-0:2.4.21-63.EL.ia64",
          "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-0:2.4.21-63.EL.s390",
          "3AS:kernel-0:2.4.21-63.EL.s390x",
          "3AS:kernel-0:2.4.21-63.EL.src",
          "3AS:kernel-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-doc-0:2.4.21-63.EL.i386",
          "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-source-0:2.4.21-63.EL.i386",
          "3AS:kernel-source-0:2.4.21-63.EL.ia64",
          "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-source-0:2.4.21-63.EL.s390",
          "3AS:kernel-source-0:2.4.21-63.EL.s390x",
          "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-0:2.4.21-63.EL.src",
          "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-0:2.4.21-63.EL.athlon",
          "3ES:kernel-0:2.4.21-63.EL.i686",
          "3ES:kernel-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-0:2.4.21-63.EL.ia64",
          "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-0:2.4.21-63.EL.s390",
          "3ES:kernel-0:2.4.21-63.EL.s390x",
          "3ES:kernel-0:2.4.21-63.EL.src",
          "3ES:kernel-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-doc-0:2.4.21-63.EL.i386",
          "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
          "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
          "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-source-0:2.4.21-63.EL.i386",
          "3ES:kernel-source-0:2.4.21-63.EL.ia64",
          "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-source-0:2.4.21-63.EL.s390",
          "3ES:kernel-source-0:2.4.21-63.EL.s390x",
          "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-0:2.4.21-63.EL.athlon",
          "3WS:kernel-0:2.4.21-63.EL.i686",
          "3WS:kernel-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-0:2.4.21-63.EL.ia64",
          "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-0:2.4.21-63.EL.s390",
          "3WS:kernel-0:2.4.21-63.EL.s390x",
          "3WS:kernel-0:2.4.21-63.EL.src",
          "3WS:kernel-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-doc-0:2.4.21-63.EL.i386",
          "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-source-0:2.4.21-63.EL.i386",
          "3WS:kernel-source-0:2.4.21-63.EL.ia64",
          "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-source-0:2.4.21-63.EL.s390",
          "3WS:kernel-source-0:2.4.21-63.EL.s390x",
          "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-5029"
        },
        {
          "category": "external",
          "summary": "RHBZ#470201",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470201"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-5029",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-5029"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5029",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5029"
        }
      ],
      "release_date": "2008-11-06T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T21:56:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1550"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Unix sockets kernel panic"
    },
    {
      "cve": "CVE-2008-5300",
      "discovery_date": "2008-11-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "473259"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Linux kernel 2.6.28 allows local users to cause a denial of service (\"soft lockup\" and process loss) via a large number of sendmsg function calls, which does not block during AF_UNIX garbage collection and triggers an OOM condition, a different vulnerability than CVE-2008-5029.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: fix soft lockups/OOM issues with unix socket garbage collector",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:kernel-0:2.4.21-63.EL.athlon",
          "3AS:kernel-0:2.4.21-63.EL.i686",
          "3AS:kernel-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-0:2.4.21-63.EL.ia64",
          "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-0:2.4.21-63.EL.s390",
          "3AS:kernel-0:2.4.21-63.EL.s390x",
          "3AS:kernel-0:2.4.21-63.EL.src",
          "3AS:kernel-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-doc-0:2.4.21-63.EL.i386",
          "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-source-0:2.4.21-63.EL.i386",
          "3AS:kernel-source-0:2.4.21-63.EL.ia64",
          "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-source-0:2.4.21-63.EL.s390",
          "3AS:kernel-source-0:2.4.21-63.EL.s390x",
          "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-0:2.4.21-63.EL.src",
          "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-0:2.4.21-63.EL.athlon",
          "3ES:kernel-0:2.4.21-63.EL.i686",
          "3ES:kernel-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-0:2.4.21-63.EL.ia64",
          "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-0:2.4.21-63.EL.s390",
          "3ES:kernel-0:2.4.21-63.EL.s390x",
          "3ES:kernel-0:2.4.21-63.EL.src",
          "3ES:kernel-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-doc-0:2.4.21-63.EL.i386",
          "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
          "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
          "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-source-0:2.4.21-63.EL.i386",
          "3ES:kernel-source-0:2.4.21-63.EL.ia64",
          "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-source-0:2.4.21-63.EL.s390",
          "3ES:kernel-source-0:2.4.21-63.EL.s390x",
          "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-0:2.4.21-63.EL.athlon",
          "3WS:kernel-0:2.4.21-63.EL.i686",
          "3WS:kernel-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-0:2.4.21-63.EL.ia64",
          "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-0:2.4.21-63.EL.s390",
          "3WS:kernel-0:2.4.21-63.EL.s390x",
          "3WS:kernel-0:2.4.21-63.EL.src",
          "3WS:kernel-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-doc-0:2.4.21-63.EL.i386",
          "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-source-0:2.4.21-63.EL.i386",
          "3WS:kernel-source-0:2.4.21-63.EL.ia64",
          "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-source-0:2.4.21-63.EL.s390",
          "3WS:kernel-source-0:2.4.21-63.EL.s390x",
          "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-5300"
        },
        {
          "category": "external",
          "summary": "RHBZ#473259",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=473259"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-5300",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-5300"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5300",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5300"
        }
      ],
      "release_date": "2008-11-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T21:56:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1550"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: fix soft lockups/OOM issues with unix socket garbage collector"
    },
    {
      "cve": "CVE-2009-1337",
      "discovery_date": "2009-04-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "493771"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1 does not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies the exit_signal field and then uses an exec system call to launch a setuid application.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: exit_notify: kill the wrong capable(CAP_KILL) check",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:kernel-0:2.4.21-63.EL.athlon",
          "3AS:kernel-0:2.4.21-63.EL.i686",
          "3AS:kernel-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-0:2.4.21-63.EL.ia64",
          "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-0:2.4.21-63.EL.s390",
          "3AS:kernel-0:2.4.21-63.EL.s390x",
          "3AS:kernel-0:2.4.21-63.EL.src",
          "3AS:kernel-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-doc-0:2.4.21-63.EL.i386",
          "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-source-0:2.4.21-63.EL.i386",
          "3AS:kernel-source-0:2.4.21-63.EL.ia64",
          "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-source-0:2.4.21-63.EL.s390",
          "3AS:kernel-source-0:2.4.21-63.EL.s390x",
          "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-0:2.4.21-63.EL.src",
          "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-0:2.4.21-63.EL.athlon",
          "3ES:kernel-0:2.4.21-63.EL.i686",
          "3ES:kernel-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-0:2.4.21-63.EL.ia64",
          "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-0:2.4.21-63.EL.s390",
          "3ES:kernel-0:2.4.21-63.EL.s390x",
          "3ES:kernel-0:2.4.21-63.EL.src",
          "3ES:kernel-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-doc-0:2.4.21-63.EL.i386",
          "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
          "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
          "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-source-0:2.4.21-63.EL.i386",
          "3ES:kernel-source-0:2.4.21-63.EL.ia64",
          "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-source-0:2.4.21-63.EL.s390",
          "3ES:kernel-source-0:2.4.21-63.EL.s390x",
          "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-0:2.4.21-63.EL.athlon",
          "3WS:kernel-0:2.4.21-63.EL.i686",
          "3WS:kernel-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-0:2.4.21-63.EL.ia64",
          "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-0:2.4.21-63.EL.s390",
          "3WS:kernel-0:2.4.21-63.EL.s390x",
          "3WS:kernel-0:2.4.21-63.EL.src",
          "3WS:kernel-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-doc-0:2.4.21-63.EL.i386",
          "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-source-0:2.4.21-63.EL.i386",
          "3WS:kernel-source-0:2.4.21-63.EL.ia64",
          "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-source-0:2.4.21-63.EL.s390",
          "3WS:kernel-source-0:2.4.21-63.EL.s390x",
          "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1337"
        },
        {
          "category": "external",
          "summary": "RHBZ#493771",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493771"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1337",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1337"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1337",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1337"
        }
      ],
      "release_date": "2009-02-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T21:56:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1550"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: exit_notify: kill the wrong capable(CAP_KILL) check"
    },
    {
      "cve": "CVE-2009-1385",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-05-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "502981"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000_clean_rx_irq() denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:kernel-0:2.4.21-63.EL.athlon",
          "3AS:kernel-0:2.4.21-63.EL.i686",
          "3AS:kernel-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-0:2.4.21-63.EL.ia64",
          "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-0:2.4.21-63.EL.s390",
          "3AS:kernel-0:2.4.21-63.EL.s390x",
          "3AS:kernel-0:2.4.21-63.EL.src",
          "3AS:kernel-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-doc-0:2.4.21-63.EL.i386",
          "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-source-0:2.4.21-63.EL.i386",
          "3AS:kernel-source-0:2.4.21-63.EL.ia64",
          "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-source-0:2.4.21-63.EL.s390",
          "3AS:kernel-source-0:2.4.21-63.EL.s390x",
          "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-0:2.4.21-63.EL.src",
          "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-0:2.4.21-63.EL.athlon",
          "3ES:kernel-0:2.4.21-63.EL.i686",
          "3ES:kernel-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-0:2.4.21-63.EL.ia64",
          "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-0:2.4.21-63.EL.s390",
          "3ES:kernel-0:2.4.21-63.EL.s390x",
          "3ES:kernel-0:2.4.21-63.EL.src",
          "3ES:kernel-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-doc-0:2.4.21-63.EL.i386",
          "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
          "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
          "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-source-0:2.4.21-63.EL.i386",
          "3ES:kernel-source-0:2.4.21-63.EL.ia64",
          "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-source-0:2.4.21-63.EL.s390",
          "3ES:kernel-source-0:2.4.21-63.EL.s390x",
          "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-0:2.4.21-63.EL.athlon",
          "3WS:kernel-0:2.4.21-63.EL.i686",
          "3WS:kernel-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-0:2.4.21-63.EL.ia64",
          "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-0:2.4.21-63.EL.s390",
          "3WS:kernel-0:2.4.21-63.EL.s390x",
          "3WS:kernel-0:2.4.21-63.EL.src",
          "3WS:kernel-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-doc-0:2.4.21-63.EL.i386",
          "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-source-0:2.4.21-63.EL.i386",
          "3WS:kernel-source-0:2.4.21-63.EL.ia64",
          "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-source-0:2.4.21-63.EL.s390",
          "3WS:kernel-source-0:2.4.21-63.EL.s390x",
          "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "RHBZ#502981",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385"
        }
      ],
      "release_date": "2007-04-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T21:56:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1550"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000_clean_rx_irq() denial of service"
    },
    {
      "cve": "CVE-2009-1895",
      "discovery_date": "2009-06-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "511171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: personality: fix PER_CLEAR_ON_SETID",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:kernel-0:2.4.21-63.EL.athlon",
          "3AS:kernel-0:2.4.21-63.EL.i686",
          "3AS:kernel-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-0:2.4.21-63.EL.ia64",
          "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-0:2.4.21-63.EL.s390",
          "3AS:kernel-0:2.4.21-63.EL.s390x",
          "3AS:kernel-0:2.4.21-63.EL.src",
          "3AS:kernel-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-doc-0:2.4.21-63.EL.i386",
          "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-source-0:2.4.21-63.EL.i386",
          "3AS:kernel-source-0:2.4.21-63.EL.ia64",
          "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-source-0:2.4.21-63.EL.s390",
          "3AS:kernel-source-0:2.4.21-63.EL.s390x",
          "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-0:2.4.21-63.EL.src",
          "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-0:2.4.21-63.EL.athlon",
          "3ES:kernel-0:2.4.21-63.EL.i686",
          "3ES:kernel-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-0:2.4.21-63.EL.ia64",
          "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-0:2.4.21-63.EL.s390",
          "3ES:kernel-0:2.4.21-63.EL.s390x",
          "3ES:kernel-0:2.4.21-63.EL.src",
          "3ES:kernel-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-doc-0:2.4.21-63.EL.i386",
          "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
          "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
          "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-source-0:2.4.21-63.EL.i386",
          "3ES:kernel-source-0:2.4.21-63.EL.ia64",
          "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-source-0:2.4.21-63.EL.s390",
          "3ES:kernel-source-0:2.4.21-63.EL.s390x",
          "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-0:2.4.21-63.EL.athlon",
          "3WS:kernel-0:2.4.21-63.EL.i686",
          "3WS:kernel-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-0:2.4.21-63.EL.ia64",
          "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-0:2.4.21-63.EL.s390",
          "3WS:kernel-0:2.4.21-63.EL.s390x",
          "3WS:kernel-0:2.4.21-63.EL.src",
          "3WS:kernel-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-doc-0:2.4.21-63.EL.i386",
          "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-source-0:2.4.21-63.EL.i386",
          "3WS:kernel-source-0:2.4.21-63.EL.ia64",
          "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-source-0:2.4.21-63.EL.s390",
          "3WS:kernel-source-0:2.4.21-63.EL.s390x",
          "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "RHBZ#511171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1895",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895"
        }
      ],
      "release_date": "2009-06-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T21:56:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1550"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: personality: fix PER_CLEAR_ON_SETID"
    },
    {
      "cve": "CVE-2009-2848",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-08-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "515423"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current-\u003eclear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: execve: must clear current-\u003eclear_child_tid",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:kernel-0:2.4.21-63.EL.athlon",
          "3AS:kernel-0:2.4.21-63.EL.i686",
          "3AS:kernel-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-0:2.4.21-63.EL.ia64",
          "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-0:2.4.21-63.EL.s390",
          "3AS:kernel-0:2.4.21-63.EL.s390x",
          "3AS:kernel-0:2.4.21-63.EL.src",
          "3AS:kernel-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-doc-0:2.4.21-63.EL.i386",
          "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-source-0:2.4.21-63.EL.i386",
          "3AS:kernel-source-0:2.4.21-63.EL.ia64",
          "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-source-0:2.4.21-63.EL.s390",
          "3AS:kernel-source-0:2.4.21-63.EL.s390x",
          "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-0:2.4.21-63.EL.src",
          "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-0:2.4.21-63.EL.athlon",
          "3ES:kernel-0:2.4.21-63.EL.i686",
          "3ES:kernel-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-0:2.4.21-63.EL.ia64",
          "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-0:2.4.21-63.EL.s390",
          "3ES:kernel-0:2.4.21-63.EL.s390x",
          "3ES:kernel-0:2.4.21-63.EL.src",
          "3ES:kernel-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-doc-0:2.4.21-63.EL.i386",
          "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
          "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
          "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-source-0:2.4.21-63.EL.i386",
          "3ES:kernel-source-0:2.4.21-63.EL.ia64",
          "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-source-0:2.4.21-63.EL.s390",
          "3ES:kernel-source-0:2.4.21-63.EL.s390x",
          "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-0:2.4.21-63.EL.athlon",
          "3WS:kernel-0:2.4.21-63.EL.i686",
          "3WS:kernel-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-0:2.4.21-63.EL.ia64",
          "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-0:2.4.21-63.EL.s390",
          "3WS:kernel-0:2.4.21-63.EL.s390x",
          "3WS:kernel-0:2.4.21-63.EL.src",
          "3WS:kernel-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-doc-0:2.4.21-63.EL.i386",
          "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-source-0:2.4.21-63.EL.i386",
          "3WS:kernel-source-0:2.4.21-63.EL.ia64",
          "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-source-0:2.4.21-63.EL.s390",
          "3WS:kernel-source-0:2.4.21-63.EL.s390x",
          "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2848"
        },
        {
          "category": "external",
          "summary": "RHBZ#515423",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515423"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2848",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2848"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2848",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2848"
        }
      ],
      "release_date": "2009-07-31T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T21:56:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1550"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: execve: must clear current-\u003eclear_child_tid"
    },
    {
      "cve": "CVE-2009-3002",
      "discovery_date": "2009-08-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "519305"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Linux kernel before 2.6.31-rc7 does not initialize certain data structures within getname functions, which allows local users to read the contents of some kernel memory locations by calling getsockname on (1) an AF_APPLETALK socket, related to the atalk_getname function in net/appletalk/ddp.c; (2) an AF_IRDA socket, related to the irda_getname function in net/irda/af_irda.c; (3) an AF_ECONET socket, related to the econet_getname function in net/econet/af_econet.c; (4) an AF_NETROM socket, related to the nr_getname function in net/netrom/af_netrom.c; (5) an AF_ROSE socket, related to the rose_getname function in net/rose/af_rose.c; or (6) a raw CAN socket, related to the raw_getname function in net/can/raw.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: numerous getname() infoleaks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "CVE-2009-3002 describes a collection of similar information leaks that affect numerous networking protocols.\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4 and 5 did not enable support for the AppleTalk DDP protocol, and therefore were not affected by issue (1).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG did not enable support for IrDA sockets, and therefore were not affected by issue (2).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG did not enable support for the Acorn Econet and AUN protocols, and therefore were not affected by issue (3).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG did not enable support for the NET/ROM and ROSE protocols, and therefore were not affected by issues (4) and (5).\n\nThe raw_getname() leak was introduced in the Linux kernel version 2.6.25-rc1. The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG therefore were not affected by issue (6).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:kernel-0:2.4.21-63.EL.athlon",
          "3AS:kernel-0:2.4.21-63.EL.i686",
          "3AS:kernel-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-0:2.4.21-63.EL.ia64",
          "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-0:2.4.21-63.EL.s390",
          "3AS:kernel-0:2.4.21-63.EL.s390x",
          "3AS:kernel-0:2.4.21-63.EL.src",
          "3AS:kernel-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-doc-0:2.4.21-63.EL.i386",
          "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-source-0:2.4.21-63.EL.i386",
          "3AS:kernel-source-0:2.4.21-63.EL.ia64",
          "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-source-0:2.4.21-63.EL.s390",
          "3AS:kernel-source-0:2.4.21-63.EL.s390x",
          "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-0:2.4.21-63.EL.src",
          "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-0:2.4.21-63.EL.athlon",
          "3ES:kernel-0:2.4.21-63.EL.i686",
          "3ES:kernel-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-0:2.4.21-63.EL.ia64",
          "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-0:2.4.21-63.EL.s390",
          "3ES:kernel-0:2.4.21-63.EL.s390x",
          "3ES:kernel-0:2.4.21-63.EL.src",
          "3ES:kernel-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-doc-0:2.4.21-63.EL.i386",
          "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
          "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
          "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-source-0:2.4.21-63.EL.i386",
          "3ES:kernel-source-0:2.4.21-63.EL.ia64",
          "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-source-0:2.4.21-63.EL.s390",
          "3ES:kernel-source-0:2.4.21-63.EL.s390x",
          "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-0:2.4.21-63.EL.athlon",
          "3WS:kernel-0:2.4.21-63.EL.i686",
          "3WS:kernel-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-0:2.4.21-63.EL.ia64",
          "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-0:2.4.21-63.EL.s390",
          "3WS:kernel-0:2.4.21-63.EL.s390x",
          "3WS:kernel-0:2.4.21-63.EL.src",
          "3WS:kernel-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-doc-0:2.4.21-63.EL.i386",
          "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-source-0:2.4.21-63.EL.i386",
          "3WS:kernel-source-0:2.4.21-63.EL.ia64",
          "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-source-0:2.4.21-63.EL.s390",
          "3WS:kernel-source-0:2.4.21-63.EL.s390x",
          "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3002"
        },
        {
          "category": "external",
          "summary": "RHBZ#519305",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519305"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3002",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3002"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3002",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3002"
        }
      ],
      "release_date": "2009-08-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T21:56:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1550"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: numerous getname() infoleaks"
    },
    {
      "cve": "CVE-2009-3547",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "530490"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: fs: pipe.c null pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:kernel-0:2.4.21-63.EL.athlon",
          "3AS:kernel-0:2.4.21-63.EL.i686",
          "3AS:kernel-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-0:2.4.21-63.EL.ia64",
          "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-0:2.4.21-63.EL.s390",
          "3AS:kernel-0:2.4.21-63.EL.s390x",
          "3AS:kernel-0:2.4.21-63.EL.src",
          "3AS:kernel-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-doc-0:2.4.21-63.EL.i386",
          "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-source-0:2.4.21-63.EL.i386",
          "3AS:kernel-source-0:2.4.21-63.EL.ia64",
          "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-source-0:2.4.21-63.EL.s390",
          "3AS:kernel-source-0:2.4.21-63.EL.s390x",
          "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-0:2.4.21-63.EL.src",
          "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-0:2.4.21-63.EL.athlon",
          "3ES:kernel-0:2.4.21-63.EL.i686",
          "3ES:kernel-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-0:2.4.21-63.EL.ia64",
          "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-0:2.4.21-63.EL.s390",
          "3ES:kernel-0:2.4.21-63.EL.s390x",
          "3ES:kernel-0:2.4.21-63.EL.src",
          "3ES:kernel-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-doc-0:2.4.21-63.EL.i386",
          "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
          "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
          "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-source-0:2.4.21-63.EL.i386",
          "3ES:kernel-source-0:2.4.21-63.EL.ia64",
          "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-source-0:2.4.21-63.EL.s390",
          "3ES:kernel-source-0:2.4.21-63.EL.s390x",
          "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-0:2.4.21-63.EL.athlon",
          "3WS:kernel-0:2.4.21-63.EL.i686",
          "3WS:kernel-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-0:2.4.21-63.EL.ia64",
          "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-0:2.4.21-63.EL.s390",
          "3WS:kernel-0:2.4.21-63.EL.s390x",
          "3WS:kernel-0:2.4.21-63.EL.src",
          "3WS:kernel-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-doc-0:2.4.21-63.EL.i386",
          "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-source-0:2.4.21-63.EL.i386",
          "3WS:kernel-source-0:2.4.21-63.EL.ia64",
          "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-source-0:2.4.21-63.EL.s390",
          "3WS:kernel-source-0:2.4.21-63.EL.s390x",
          "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3547"
        },
        {
          "category": "external",
          "summary": "RHBZ#530490",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530490"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3547",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3547"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3547",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3547"
        }
      ],
      "release_date": "2009-10-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T21:56:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1550"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: fs: pipe.c null pointer dereference"
    }
  ]
}
  rhsa-2009_1132
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix several security issues and various bugs\nare now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a flaw was found in the Intel PRO/1000 network driver in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service. (CVE-2009-1385, Important)\n\n* the Linux kernel Network File System daemon (nfsd) implementation did not\ndrop the CAP_MKNOD capability when handling requests from local,\nunprivileged users. This flaw could possibly lead to an information leak or\nprivilege escalation. (CVE-2009-1072, Moderate)\n\n* Frank Filz reported the NFSv4 client was missing a file permission check\nfor the execute bit in some situations. This could allow local,\nunprivileged users to run non-executable files on NFSv4 mounted file\nsystems. (CVE-2009-1630, Moderate)\n\n* a missing check was found in the hypervisor_callback() function in the\nLinux kernel provided by the kernel-xen package. This could cause a denial\nof service of a 32-bit guest if an application running in that guest\naccesses a certain memory location in the kernel. (CVE-2009-1758, Moderate)\n\n* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and\nagp_generic_alloc_pages() functions did not zero out the memory pages they\nallocate, which may later be available to user-space processes. This flaw\ncould possibly lead to an information leak. (CVE-2009-1192, Low)\n\nThese updated packages also fix the following bugs:\n\n* \"/proc/[pid]/maps\" and \"/proc/[pid]/smaps\" can only be read by processes\nable to use the ptrace() call on a given process; however, certain\ninformation from \"/proc/[pid]/stat\" and \"/proc/[pid]/wchan\" could be used\nto reconstruct memory maps, making it possible to bypass the Address Space\nLayout Randomization (ASLR) security feature. This update addresses this\nissue. (BZ#499549)\n\n* in some situations, the link count was not decreased when renaming unused\nfiles on NFS mounted file systems. This may have resulted in poor\nperformance. With this update, the link count is decreased in these\nsituations, the same as is done for other file operations, such as unlink\nand rmdir. (BZ#501802)\n\n* tcp_ack() cleared the probes_out variable even if there were outstanding\npackets. When low TCP keepalive intervals were used, this bug may have\ncaused problems, such as connections terminating, when using remote tools\nsuch as rsh and rlogin. (BZ#501754)\n\n* off-by-one errors in the time normalization code could have caused\nclock_gettime() to return one billion nanoseconds, rather than adding an\nextra second. This bug could have caused the name service cache daemon\n(nscd) to consume excessive CPU resources. (BZ#501800)\n\n* a system panic could occur when one thread read \"/proc/bus/input/devices\"\nwhile another was removing a device. With this update, a mutex has been\nadded to protect the input_dev_list and input_handler_list variables, which\nresolves this issue. (BZ#501804)\n\n* using netdump may have caused a kernel deadlock on some systems.\n(BZ#504565)\n\n* the file system mask, which lists capabilities for users with a file\nsystem user ID (fsuid) of 0, was missing the CAP_MKNOD and\nCAP_LINUX_IMMUTABLE capabilities. This could, potentially, allow users with\nan fsuid other than 0 to perform actions on some file system types that\nwould otherwise be prevented. This update adds these capabilities. (BZ#497269)\n\nAll Red Hat Enterprise Linux 4 users should upgrade to these updated\npackages, which contain backported patches to resolve these issues. Note:\nThe system must be rebooted for this update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1132",
        "url": "https://access.redhat.com/errata/RHSA-2009:1132"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "491572",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572"
      },
      {
        "category": "external",
        "summary": "497020",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020"
      },
      {
        "category": "external",
        "summary": "499549",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=499549"
      },
      {
        "category": "external",
        "summary": "500297",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297"
      },
      {
        "category": "external",
        "summary": "500945",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500945"
      },
      {
        "category": "external",
        "summary": "501754",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501754"
      },
      {
        "category": "external",
        "summary": "501800",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501800"
      },
      {
        "category": "external",
        "summary": "501802",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501802"
      },
      {
        "category": "external",
        "summary": "501804",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501804"
      },
      {
        "category": "external",
        "summary": "502981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
      },
      {
        "category": "external",
        "summary": "504565",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504565"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1132.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-22T03:12:53+00:00",
      "generator": {
        "date": "2024-11-22T03:12:53+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2009:1132",
      "initial_release_date": "2009-06-30T08:05:00+00:00",
      "revision_history": [
        {
          "date": "2009-06-30T08:05:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-06-30T04:06:02+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T03:12:53+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 4",
                  "product_id": "4AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop version 4",
                  "product_id": "4Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 4",
                  "product_id": "4ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 4",
                  "product_id": "4WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-smp-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-smp-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-xenU-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-xenU-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.3.EL.i686",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.3.EL.i686",
                  "product_id": "kernel-0:2.6.9-89.0.3.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.3.EL.x86_64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_id": "kernel-0:2.6.9-89.0.3.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.3.EL.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.3.EL.ia64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.3.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.3.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.3.EL.ia64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.3.EL.ia64",
                  "product_id": "kernel-0:2.6.9-89.0.3.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.9-89.0.3.EL.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.9-89.0.3.EL.noarch",
                  "product_id": "kernel-doc-0:2.6.9-89.0.3.EL.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-89.0.3.EL?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.3.EL.src",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.3.EL.src",
                  "product_id": "kernel-0:2.6.9-89.0.3.EL.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
                  "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
                  "product_id": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.3.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.3.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.3.EL.ppc64",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.3.EL.ppc64",
                  "product_id": "kernel-0:2.6.9-89.0.3.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
                  "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
                  "product_id": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=ppc64iseries"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64iseries"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390x",
                  "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.3.EL.s390x",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.3.EL.s390x",
                  "product_id": "kernel-0:2.6.9-89.0.3.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
                  "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390",
                "product": {
                  "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390",
                  "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-89.0.3.EL.s390",
                "product": {
                  "name": "kernel-0:2.6.9-89.0.3.EL.s390",
                  "product_id": "kernel-0:2.6.9-89.0.3.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.src as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.src",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.3.EL.noarch as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.3.EL.noarch",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.src as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.src",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.3.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.3.EL.noarch",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.src as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.src",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.3.EL.noarch as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.3.EL.noarch",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.src as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.src",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-89.0.3.EL.noarch as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-89.0.3.EL.noarch",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
        "relates_to_product_reference": "4WS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-1072",
      "discovery_date": "2009-03-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "491572"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: nfsd should drop CAP_MKNOD for non-root",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 2.1 and 3, due to these products being in Production 3 of their maintenance life-cycles, where only qualified security errata of important or critical impact are addressed.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.3.EL.src",
          "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.3.EL.src",
          "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.3.EL.src",
          "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1072"
        },
        {
          "category": "external",
          "summary": "RHBZ#491572",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1072",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1072"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072"
        }
      ],
      "release_date": "2009-03-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-06-30T08:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1132"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: nfsd should drop CAP_MKNOD for non-root"
    },
    {
      "cve": "CVE-2009-1192",
      "discovery_date": "2009-04-22T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "497020"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The (1) agp_generic_alloc_page and (2) agp_generic_alloc_pages functions in drivers/char/agp/generic.c in the agp subsystem in the Linux kernel before 2.6.30-rc3 do not zero out pages that may later be available to a user-space process, which allows local users to obtain sensitive information by reading these pages.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: agp: zero pages before sending to userspace",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.3.EL.src",
          "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.3.EL.src",
          "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.3.EL.src",
          "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1192"
        },
        {
          "category": "external",
          "summary": "RHBZ#497020",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1192",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1192"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192"
        }
      ],
      "release_date": "2009-04-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-06-30T08:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1132"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "kernel: agp: zero pages before sending to userspace"
    },
    {
      "cve": "CVE-2009-1385",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-05-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "502981"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000_clean_rx_irq() denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.3.EL.src",
          "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.3.EL.src",
          "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.3.EL.src",
          "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "RHBZ#502981",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385"
        }
      ],
      "release_date": "2007-04-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-06-30T08:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1132"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000_clean_rx_irq() denial of service"
    },
    {
      "cve": "CVE-2009-1630",
      "discovery_date": "2009-05-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "500297"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.3.EL.src",
          "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.3.EL.src",
          "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.3.EL.src",
          "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1630"
        },
        {
          "category": "external",
          "summary": "RHBZ#500297",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1630",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1630"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630"
        }
      ],
      "release_date": "2009-05-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-06-30T08:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1132"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission"
    },
    {
      "cve": "CVE-2009-1758",
      "discovery_date": "2009-05-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "500945"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The hypervisor_callback function in Xen, possibly before 3.4.0, as applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other versions allows guest user applications to cause a denial of service (kernel oops) of the guest OS by triggering a segmentation fault in \"certain address ranges.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: xen: local denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and Red Hat Enterprise MRG.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-0:2.6.9-89.0.3.EL.src",
          "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
          "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-0:2.6.9-89.0.3.EL.src",
          "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-0:2.6.9-89.0.3.EL.src",
          "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1758"
        },
        {
          "category": "external",
          "summary": "RHBZ#500945",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500945"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1758",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1758"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1758",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1758"
        }
      ],
      "release_date": "2009-05-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-06-30T08:05:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1132"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-0:2.6.9-89.0.3.EL.src",
            "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.src",
            "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-0:2.6.9-89.0.3.EL.src",
            "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-0:2.6.9-89.0.3.EL.src",
            "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: xen: local denial of service"
    }
  ]
}
  rhsa-2009_1550
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix several security issues and multiple bugs\nare now available for Red Hat Enterprise Linux 3.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* when fput() was called to close a socket, the __scm_destroy() function in\nthe Linux kernel could make indirect recursive calls to itself. This could,\npotentially, lead to a denial of service issue. (CVE-2008-5029, Important)\n\n* the sendmsg() function in the Linux kernel did not block during UNIX\nsocket garbage collection. This could, potentially, lead to a local denial\nof service. (CVE-2008-5300, Important)\n\n* the exit_notify() function in the Linux kernel did not properly reset the\nexit signal if a process executed a set user ID (setuid) application before\nexiting. This could allow a local, unprivileged user to elevate their\nprivileges. (CVE-2009-1337, Important)\n\n* a flaw was found in the Intel PRO/1000 network driver in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service or code execution. (CVE-2009-1385,\nImportant)\n\n* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a\nsetuid or setgid program was executed. A local, unprivileged user could use\nthis flaw to bypass the mmap_min_addr protection mechanism and perform a\nNULL pointer dereference attack, or bypass the Address Space Layout\nRandomization (ASLR) security feature. (CVE-2009-1895, Important)\n\n* it was discovered that, when executing a new process, the clear_child_tid\npointer in the Linux kernel is not cleared. If this pointer points to a\nwritable portion of the memory of the new program, the kernel could corrupt\nfour bytes of memory, possibly leading to a local denial of service or\nprivilege escalation. (CVE-2009-2848, Important)\n\n* missing initialization flaws were found in getname() implementations in\nthe IrDA sockets, AppleTalk DDP protocol, NET/ROM protocol, and ROSE\nprotocol implementations in the Linux kernel. Certain data structures in\nthese getname() implementations were not initialized properly before being\ncopied to user-space. These flaws could lead to an information leak.\n(CVE-2009-3002, Important)\n\n* a NULL pointer dereference flaw was found in each of the following\nfunctions in the Linux kernel: pipe_read_open(), pipe_write_open(), and\npipe_rdwr_open(). When the mutex lock is not held, the i_pipe pointer could\nbe released by other processes before it is used to update the pipe\u0027s\nreader and writer counters. This could lead to a local denial of service or\nprivilege escalation. (CVE-2009-3547, Important)\n\nBug fixes:\n\n* this update adds the mmap_min_addr tunable and restriction checks to help\nprevent unprivileged users from creating new memory mappings below the\nminimum address. This can help prevent the exploitation of NULL pointer\ndereference bugs. Note that mmap_min_addr is set to zero (disabled) by\ndefault for backwards compatibility. (BZ#512642)\n\n* a bridge reference count problem in IPv6 has been fixed. (BZ#457010)\n\n* enforce null-termination of user-supplied arguments to setsockopt().\n(BZ#505514)\n\n* the gcc flag \"-fno-delete-null-pointer-checks\" was added to the kernel\nbuild options. This prevents gcc from optimizing out NULL pointer checks\nafter the first use of a pointer. NULL pointer bugs are often exploited by\nattackers. Keeping these checks is a safety measure. (BZ#511185)\n\n* a check has been added to the IPv4 code to make sure that rt is not NULL,\nto help prevent future bugs in functions that call ip_append_data() from\nbeing exploitable. (BZ#520300)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1550",
        "url": "https://access.redhat.com/errata/RHSA-2009:1550"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-17866",
        "url": "http://kbase.redhat.com/faq/docs/DOC-17866"
      },
      {
        "category": "external",
        "summary": "457010",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=457010"
      },
      {
        "category": "external",
        "summary": "470201",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470201"
      },
      {
        "category": "external",
        "summary": "473259",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=473259"
      },
      {
        "category": "external",
        "summary": "493771",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493771"
      },
      {
        "category": "external",
        "summary": "502981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
      },
      {
        "category": "external",
        "summary": "505514",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=505514"
      },
      {
        "category": "external",
        "summary": "511171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
      },
      {
        "category": "external",
        "summary": "511185",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511185"
      },
      {
        "category": "external",
        "summary": "512642",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512642"
      },
      {
        "category": "external",
        "summary": "515423",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515423"
      },
      {
        "category": "external",
        "summary": "519305",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519305"
      },
      {
        "category": "external",
        "summary": "520300",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=520300"
      },
      {
        "category": "external",
        "summary": "530490",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530490"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1550.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-22T03:13:20+00:00",
      "generator": {
        "date": "2024-11-22T03:13:20+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2009:1550",
      "initial_release_date": "2009-11-03T21:56:00+00:00",
      "revision_history": [
        {
          "date": "2009-11-03T21:56:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-11-03T16:59:47+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T03:13:20+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 3",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 3",
                  "product_id": "3AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:3::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Desktop version 3",
                "product": {
                  "name": "Red Hat Desktop version 3",
                  "product_id": "3Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 3",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 3",
                  "product_id": "3ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:3::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 3",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 3",
                  "product_id": "3WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-BOOT-0:2.4.21-63.EL.i386",
                "product": {
                  "name": "kernel-BOOT-0:2.4.21-63.EL.i386",
                  "product_id": "kernel-BOOT-0:2.4.21-63.EL.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-BOOT@2.4.21-63.EL?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-0:2.4.21-63.EL.i386",
                "product": {
                  "name": "kernel-source-0:2.4.21-63.EL.i386",
                  "product_id": "kernel-source-0:2.4.21-63.EL.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-source@2.4.21-63.EL?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.i386",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.i386",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.4.21-63.EL.i386",
                "product": {
                  "name": "kernel-doc-0:2.4.21-63.EL.i386",
                  "product_id": "kernel-doc-0:2.4.21-63.EL.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-63.EL?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-hugemem-0:2.4.21-63.EL.i686",
                "product": {
                  "name": "kernel-hugemem-0:2.4.21-63.EL.i686",
                  "product_id": "kernel-hugemem-0:2.4.21-63.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem@2.4.21-63.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.i686",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.i686",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-unsupported-0:2.4.21-63.EL.i686",
                "product": {
                  "name": "kernel-smp-unsupported-0:2.4.21-63.EL.i686",
                  "product_id": "kernel-smp-unsupported-0:2.4.21-63.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-63.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
                "product": {
                  "name": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
                  "product_id": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem-unsupported@2.4.21-63.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.i686",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.i686",
                  "product_id": "kernel-0:2.4.21-63.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.i686",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.4.21-63.EL.i686",
                "product": {
                  "name": "kernel-smp-0:2.4.21-63.EL.i686",
                  "product_id": "kernel-smp-0:2.4.21-63.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-63.EL?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.athlon",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.athlon",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=athlon"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
                "product": {
                  "name": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
                  "product_id": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-63.EL?arch=athlon"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.athlon",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.athlon",
                  "product_id": "kernel-0:2.4.21-63.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=athlon"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.athlon",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.athlon",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=athlon"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.4.21-63.EL.athlon",
                "product": {
                  "name": "kernel-smp-0:2.4.21-63.EL.athlon",
                  "product_id": "kernel-smp-0:2.4.21-63.EL.athlon",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-63.EL?arch=athlon"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "athlon"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.ia64",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.ia64",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.ia64",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.ia64",
                  "product_id": "kernel-0:2.4.21-63.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-0:2.4.21-63.EL.ia64",
                "product": {
                  "name": "kernel-source-0:2.4.21-63.EL.ia64",
                  "product_id": "kernel-source-0:2.4.21-63.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-source@2.4.21-63.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.ia64",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.4.21-63.EL.ia64",
                "product": {
                  "name": "kernel-doc-0:2.4.21-63.EL.ia64",
                  "product_id": "kernel-doc-0:2.4.21-63.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-63.EL?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.ia32e",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.ia32e",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.ia32e",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=ia32e"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.ia32e",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.ia32e",
                  "product_id": "kernel-0:2.4.21-63.EL.ia32e",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=ia32e"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.ia32e",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.ia32e",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.ia32e",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=ia32e"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia32e"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.x86_64",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.x86_64",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
                "product": {
                  "name": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
                  "product_id": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-63.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.x86_64",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.x86_64",
                  "product_id": "kernel-0:2.4.21-63.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-0:2.4.21-63.EL.x86_64",
                "product": {
                  "name": "kernel-source-0:2.4.21-63.EL.x86_64",
                  "product_id": "kernel-source-0:2.4.21-63.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-source@2.4.21-63.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.x86_64",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.4.21-63.EL.x86_64",
                "product": {
                  "name": "kernel-smp-0:2.4.21-63.EL.x86_64",
                  "product_id": "kernel-smp-0:2.4.21-63.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-63.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.4.21-63.EL.x86_64",
                "product": {
                  "name": "kernel-doc-0:2.4.21-63.EL.x86_64",
                  "product_id": "kernel-doc-0:2.4.21-63.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-63.EL?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.src",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.src",
                  "product_id": "kernel-0:2.4.21-63.EL.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.s390x",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.s390x",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.s390x",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.s390x",
                  "product_id": "kernel-0:2.4.21-63.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-0:2.4.21-63.EL.s390x",
                "product": {
                  "name": "kernel-source-0:2.4.21-63.EL.s390x",
                  "product_id": "kernel-source-0:2.4.21-63.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-source@2.4.21-63.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.s390x",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.4.21-63.EL.s390x",
                "product": {
                  "name": "kernel-doc-0:2.4.21-63.EL.s390x",
                  "product_id": "kernel-doc-0:2.4.21-63.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-63.EL?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.s390",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.s390",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.s390",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.s390",
                  "product_id": "kernel-0:2.4.21-63.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-0:2.4.21-63.EL.s390",
                "product": {
                  "name": "kernel-source-0:2.4.21-63.EL.s390",
                  "product_id": "kernel-source-0:2.4.21-63.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-source@2.4.21-63.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.s390",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.s390",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.4.21-63.EL.s390",
                "product": {
                  "name": "kernel-doc-0:2.4.21-63.EL.s390",
                  "product_id": "kernel-doc-0:2.4.21-63.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-63.EL?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=ppc64pseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.ppc64pseries",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.ppc64pseries",
                  "product_id": "kernel-0:2.4.21-63.EL.ppc64pseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=ppc64pseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=ppc64pseries"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64pseries"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
                "product": {
                  "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
                  "product_id": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-63.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.4.21-63.EL.ppc64iseries",
                "product": {
                  "name": "kernel-0:2.4.21-63.EL.ppc64iseries",
                  "product_id": "kernel-0:2.4.21-63.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.4.21-63.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=ppc64iseries"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64iseries"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-source-0:2.4.21-63.EL.ppc64",
                "product": {
                  "name": "kernel-source-0:2.4.21-63.EL.ppc64",
                  "product_id": "kernel-source-0:2.4.21-63.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-source@2.4.21-63.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64",
                  "product_id": "kernel-debuginfo-0:2.4.21-63.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-63.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.4.21-63.EL.ppc64",
                "product": {
                  "name": "kernel-doc-0:2.4.21-63.EL.ppc64",
                  "product_id": "kernel-doc-0:2.4.21-63.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-63.EL?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.src as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.src"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.src",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-BOOT-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-BOOT-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-BOOT-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-doc-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-doc-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-doc-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-doc-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-doc-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-doc-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-hugemem-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-smp-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-smp-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-smp-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-source-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-source-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-source-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-source-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-source-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-source-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
          "product_id": "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.athlon as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.i686 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ia32e as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ia64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.s390 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.s390x as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.src as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.src"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.src",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-BOOT-0:2.4.21-63.EL.i386 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-BOOT-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.athlon as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.i386 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.i686 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ia32e as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ia64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.s390 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.s390x as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.i386 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-doc-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.ia64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.ppc64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.s390 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-doc-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.s390x as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.4.21-63.EL.i686 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.athlon as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.i686 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-smp-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.i386 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-source-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.ia64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-source-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.ppc64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.s390 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-source-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.s390x as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-source-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.athlon as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ia32e as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ia64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.s390 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.s390x as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.x86_64 as a component of Red Hat Desktop version 3",
          "product_id": "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.src as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.src"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.src",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-BOOT-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-BOOT-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-BOOT-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-doc-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-doc-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-doc-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-doc-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-doc-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-doc-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-hugemem-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-smp-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-smp-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-smp-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-source-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-source-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-source-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-source-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-source-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-source-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
          "product_id": "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.src as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.src"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.src",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-BOOT-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-BOOT-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-BOOT-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-doc-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-doc-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-doc-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-doc-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-doc-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-doc-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-doc-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-hugemem-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-smp-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-smp-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-smp-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.i386 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-source-0:2.4.21-63.EL.i386"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.i386",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-source-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-source-0:2.4.21-63.EL.ppc64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.ppc64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-source-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-source-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-source-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-source-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.athlon as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.athlon",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.i686 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.i686"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.i686",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ia32e",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ia64",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.s390 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.s390"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.s390",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.s390x as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.s390x",
        "relates_to_product_reference": "3WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-unsupported-0:2.4.21-63.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
          "product_id": "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        },
        "product_reference": "kernel-unsupported-0:2.4.21-63.EL.x86_64",
        "relates_to_product_reference": "3WS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2008-5029",
      "discovery_date": "2008-11-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "470201"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The __scm_destroy function in net/core/scm.c in the Linux kernel 2.6.27.4, 2.6.26, and earlier makes indirect recursive calls to itself through calls to the fput function, which allows local users to cause a denial of service (panic) via vectors related to sending an SCM_RIGHTS message through a UNIX domain socket and closing file descriptors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: Unix sockets kernel panic",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:kernel-0:2.4.21-63.EL.athlon",
          "3AS:kernel-0:2.4.21-63.EL.i686",
          "3AS:kernel-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-0:2.4.21-63.EL.ia64",
          "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-0:2.4.21-63.EL.s390",
          "3AS:kernel-0:2.4.21-63.EL.s390x",
          "3AS:kernel-0:2.4.21-63.EL.src",
          "3AS:kernel-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-doc-0:2.4.21-63.EL.i386",
          "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-source-0:2.4.21-63.EL.i386",
          "3AS:kernel-source-0:2.4.21-63.EL.ia64",
          "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-source-0:2.4.21-63.EL.s390",
          "3AS:kernel-source-0:2.4.21-63.EL.s390x",
          "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-0:2.4.21-63.EL.src",
          "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-0:2.4.21-63.EL.athlon",
          "3ES:kernel-0:2.4.21-63.EL.i686",
          "3ES:kernel-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-0:2.4.21-63.EL.ia64",
          "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-0:2.4.21-63.EL.s390",
          "3ES:kernel-0:2.4.21-63.EL.s390x",
          "3ES:kernel-0:2.4.21-63.EL.src",
          "3ES:kernel-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-doc-0:2.4.21-63.EL.i386",
          "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
          "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
          "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-source-0:2.4.21-63.EL.i386",
          "3ES:kernel-source-0:2.4.21-63.EL.ia64",
          "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-source-0:2.4.21-63.EL.s390",
          "3ES:kernel-source-0:2.4.21-63.EL.s390x",
          "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-0:2.4.21-63.EL.athlon",
          "3WS:kernel-0:2.4.21-63.EL.i686",
          "3WS:kernel-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-0:2.4.21-63.EL.ia64",
          "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-0:2.4.21-63.EL.s390",
          "3WS:kernel-0:2.4.21-63.EL.s390x",
          "3WS:kernel-0:2.4.21-63.EL.src",
          "3WS:kernel-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-doc-0:2.4.21-63.EL.i386",
          "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-source-0:2.4.21-63.EL.i386",
          "3WS:kernel-source-0:2.4.21-63.EL.ia64",
          "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-source-0:2.4.21-63.EL.s390",
          "3WS:kernel-source-0:2.4.21-63.EL.s390x",
          "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-5029"
        },
        {
          "category": "external",
          "summary": "RHBZ#470201",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470201"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-5029",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-5029"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5029",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5029"
        }
      ],
      "release_date": "2008-11-06T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T21:56:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1550"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: Unix sockets kernel panic"
    },
    {
      "cve": "CVE-2008-5300",
      "discovery_date": "2008-11-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "473259"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Linux kernel 2.6.28 allows local users to cause a denial of service (\"soft lockup\" and process loss) via a large number of sendmsg function calls, which does not block during AF_UNIX garbage collection and triggers an OOM condition, a different vulnerability than CVE-2008-5029.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: fix soft lockups/OOM issues with unix socket garbage collector",
          "title": "Vulnerability summary"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:kernel-0:2.4.21-63.EL.athlon",
          "3AS:kernel-0:2.4.21-63.EL.i686",
          "3AS:kernel-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-0:2.4.21-63.EL.ia64",
          "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-0:2.4.21-63.EL.s390",
          "3AS:kernel-0:2.4.21-63.EL.s390x",
          "3AS:kernel-0:2.4.21-63.EL.src",
          "3AS:kernel-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-doc-0:2.4.21-63.EL.i386",
          "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-source-0:2.4.21-63.EL.i386",
          "3AS:kernel-source-0:2.4.21-63.EL.ia64",
          "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-source-0:2.4.21-63.EL.s390",
          "3AS:kernel-source-0:2.4.21-63.EL.s390x",
          "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-0:2.4.21-63.EL.src",
          "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-0:2.4.21-63.EL.athlon",
          "3ES:kernel-0:2.4.21-63.EL.i686",
          "3ES:kernel-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-0:2.4.21-63.EL.ia64",
          "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-0:2.4.21-63.EL.s390",
          "3ES:kernel-0:2.4.21-63.EL.s390x",
          "3ES:kernel-0:2.4.21-63.EL.src",
          "3ES:kernel-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-doc-0:2.4.21-63.EL.i386",
          "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
          "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
          "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-source-0:2.4.21-63.EL.i386",
          "3ES:kernel-source-0:2.4.21-63.EL.ia64",
          "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-source-0:2.4.21-63.EL.s390",
          "3ES:kernel-source-0:2.4.21-63.EL.s390x",
          "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-0:2.4.21-63.EL.athlon",
          "3WS:kernel-0:2.4.21-63.EL.i686",
          "3WS:kernel-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-0:2.4.21-63.EL.ia64",
          "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-0:2.4.21-63.EL.s390",
          "3WS:kernel-0:2.4.21-63.EL.s390x",
          "3WS:kernel-0:2.4.21-63.EL.src",
          "3WS:kernel-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-doc-0:2.4.21-63.EL.i386",
          "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-source-0:2.4.21-63.EL.i386",
          "3WS:kernel-source-0:2.4.21-63.EL.ia64",
          "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-source-0:2.4.21-63.EL.s390",
          "3WS:kernel-source-0:2.4.21-63.EL.s390x",
          "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-5300"
        },
        {
          "category": "external",
          "summary": "RHBZ#473259",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=473259"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-5300",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-5300"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5300",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5300"
        }
      ],
      "release_date": "2008-11-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T21:56:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1550"
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: fix soft lockups/OOM issues with unix socket garbage collector"
    },
    {
      "cve": "CVE-2009-1337",
      "discovery_date": "2009-04-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "493771"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1 does not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies the exit_signal field and then uses an exec system call to launch a setuid application.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: exit_notify: kill the wrong capable(CAP_KILL) check",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:kernel-0:2.4.21-63.EL.athlon",
          "3AS:kernel-0:2.4.21-63.EL.i686",
          "3AS:kernel-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-0:2.4.21-63.EL.ia64",
          "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-0:2.4.21-63.EL.s390",
          "3AS:kernel-0:2.4.21-63.EL.s390x",
          "3AS:kernel-0:2.4.21-63.EL.src",
          "3AS:kernel-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-doc-0:2.4.21-63.EL.i386",
          "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-source-0:2.4.21-63.EL.i386",
          "3AS:kernel-source-0:2.4.21-63.EL.ia64",
          "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-source-0:2.4.21-63.EL.s390",
          "3AS:kernel-source-0:2.4.21-63.EL.s390x",
          "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-0:2.4.21-63.EL.src",
          "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-0:2.4.21-63.EL.athlon",
          "3ES:kernel-0:2.4.21-63.EL.i686",
          "3ES:kernel-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-0:2.4.21-63.EL.ia64",
          "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-0:2.4.21-63.EL.s390",
          "3ES:kernel-0:2.4.21-63.EL.s390x",
          "3ES:kernel-0:2.4.21-63.EL.src",
          "3ES:kernel-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-doc-0:2.4.21-63.EL.i386",
          "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
          "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
          "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-source-0:2.4.21-63.EL.i386",
          "3ES:kernel-source-0:2.4.21-63.EL.ia64",
          "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-source-0:2.4.21-63.EL.s390",
          "3ES:kernel-source-0:2.4.21-63.EL.s390x",
          "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-0:2.4.21-63.EL.athlon",
          "3WS:kernel-0:2.4.21-63.EL.i686",
          "3WS:kernel-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-0:2.4.21-63.EL.ia64",
          "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-0:2.4.21-63.EL.s390",
          "3WS:kernel-0:2.4.21-63.EL.s390x",
          "3WS:kernel-0:2.4.21-63.EL.src",
          "3WS:kernel-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-doc-0:2.4.21-63.EL.i386",
          "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-source-0:2.4.21-63.EL.i386",
          "3WS:kernel-source-0:2.4.21-63.EL.ia64",
          "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-source-0:2.4.21-63.EL.s390",
          "3WS:kernel-source-0:2.4.21-63.EL.s390x",
          "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1337"
        },
        {
          "category": "external",
          "summary": "RHBZ#493771",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493771"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1337",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1337"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1337",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1337"
        }
      ],
      "release_date": "2009-02-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T21:56:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1550"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: exit_notify: kill the wrong capable(CAP_KILL) check"
    },
    {
      "cve": "CVE-2009-1385",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-05-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "502981"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000_clean_rx_irq() denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:kernel-0:2.4.21-63.EL.athlon",
          "3AS:kernel-0:2.4.21-63.EL.i686",
          "3AS:kernel-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-0:2.4.21-63.EL.ia64",
          "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-0:2.4.21-63.EL.s390",
          "3AS:kernel-0:2.4.21-63.EL.s390x",
          "3AS:kernel-0:2.4.21-63.EL.src",
          "3AS:kernel-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-doc-0:2.4.21-63.EL.i386",
          "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-source-0:2.4.21-63.EL.i386",
          "3AS:kernel-source-0:2.4.21-63.EL.ia64",
          "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-source-0:2.4.21-63.EL.s390",
          "3AS:kernel-source-0:2.4.21-63.EL.s390x",
          "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-0:2.4.21-63.EL.src",
          "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-0:2.4.21-63.EL.athlon",
          "3ES:kernel-0:2.4.21-63.EL.i686",
          "3ES:kernel-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-0:2.4.21-63.EL.ia64",
          "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-0:2.4.21-63.EL.s390",
          "3ES:kernel-0:2.4.21-63.EL.s390x",
          "3ES:kernel-0:2.4.21-63.EL.src",
          "3ES:kernel-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-doc-0:2.4.21-63.EL.i386",
          "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
          "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
          "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-source-0:2.4.21-63.EL.i386",
          "3ES:kernel-source-0:2.4.21-63.EL.ia64",
          "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-source-0:2.4.21-63.EL.s390",
          "3ES:kernel-source-0:2.4.21-63.EL.s390x",
          "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-0:2.4.21-63.EL.athlon",
          "3WS:kernel-0:2.4.21-63.EL.i686",
          "3WS:kernel-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-0:2.4.21-63.EL.ia64",
          "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-0:2.4.21-63.EL.s390",
          "3WS:kernel-0:2.4.21-63.EL.s390x",
          "3WS:kernel-0:2.4.21-63.EL.src",
          "3WS:kernel-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-doc-0:2.4.21-63.EL.i386",
          "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-source-0:2.4.21-63.EL.i386",
          "3WS:kernel-source-0:2.4.21-63.EL.ia64",
          "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-source-0:2.4.21-63.EL.s390",
          "3WS:kernel-source-0:2.4.21-63.EL.s390x",
          "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "RHBZ#502981",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385"
        }
      ],
      "release_date": "2007-04-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T21:56:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1550"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000_clean_rx_irq() denial of service"
    },
    {
      "cve": "CVE-2009-1895",
      "discovery_date": "2009-06-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "511171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: personality: fix PER_CLEAR_ON_SETID",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:kernel-0:2.4.21-63.EL.athlon",
          "3AS:kernel-0:2.4.21-63.EL.i686",
          "3AS:kernel-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-0:2.4.21-63.EL.ia64",
          "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-0:2.4.21-63.EL.s390",
          "3AS:kernel-0:2.4.21-63.EL.s390x",
          "3AS:kernel-0:2.4.21-63.EL.src",
          "3AS:kernel-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-doc-0:2.4.21-63.EL.i386",
          "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-source-0:2.4.21-63.EL.i386",
          "3AS:kernel-source-0:2.4.21-63.EL.ia64",
          "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-source-0:2.4.21-63.EL.s390",
          "3AS:kernel-source-0:2.4.21-63.EL.s390x",
          "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-0:2.4.21-63.EL.src",
          "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-0:2.4.21-63.EL.athlon",
          "3ES:kernel-0:2.4.21-63.EL.i686",
          "3ES:kernel-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-0:2.4.21-63.EL.ia64",
          "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-0:2.4.21-63.EL.s390",
          "3ES:kernel-0:2.4.21-63.EL.s390x",
          "3ES:kernel-0:2.4.21-63.EL.src",
          "3ES:kernel-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-doc-0:2.4.21-63.EL.i386",
          "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
          "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
          "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-source-0:2.4.21-63.EL.i386",
          "3ES:kernel-source-0:2.4.21-63.EL.ia64",
          "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-source-0:2.4.21-63.EL.s390",
          "3ES:kernel-source-0:2.4.21-63.EL.s390x",
          "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-0:2.4.21-63.EL.athlon",
          "3WS:kernel-0:2.4.21-63.EL.i686",
          "3WS:kernel-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-0:2.4.21-63.EL.ia64",
          "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-0:2.4.21-63.EL.s390",
          "3WS:kernel-0:2.4.21-63.EL.s390x",
          "3WS:kernel-0:2.4.21-63.EL.src",
          "3WS:kernel-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-doc-0:2.4.21-63.EL.i386",
          "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-source-0:2.4.21-63.EL.i386",
          "3WS:kernel-source-0:2.4.21-63.EL.ia64",
          "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-source-0:2.4.21-63.EL.s390",
          "3WS:kernel-source-0:2.4.21-63.EL.s390x",
          "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "RHBZ#511171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1895",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895"
        }
      ],
      "release_date": "2009-06-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T21:56:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1550"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: personality: fix PER_CLEAR_ON_SETID"
    },
    {
      "cve": "CVE-2009-2848",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-08-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "515423"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current-\u003eclear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: execve: must clear current-\u003eclear_child_tid",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:kernel-0:2.4.21-63.EL.athlon",
          "3AS:kernel-0:2.4.21-63.EL.i686",
          "3AS:kernel-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-0:2.4.21-63.EL.ia64",
          "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-0:2.4.21-63.EL.s390",
          "3AS:kernel-0:2.4.21-63.EL.s390x",
          "3AS:kernel-0:2.4.21-63.EL.src",
          "3AS:kernel-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-doc-0:2.4.21-63.EL.i386",
          "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-source-0:2.4.21-63.EL.i386",
          "3AS:kernel-source-0:2.4.21-63.EL.ia64",
          "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-source-0:2.4.21-63.EL.s390",
          "3AS:kernel-source-0:2.4.21-63.EL.s390x",
          "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-0:2.4.21-63.EL.src",
          "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-0:2.4.21-63.EL.athlon",
          "3ES:kernel-0:2.4.21-63.EL.i686",
          "3ES:kernel-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-0:2.4.21-63.EL.ia64",
          "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-0:2.4.21-63.EL.s390",
          "3ES:kernel-0:2.4.21-63.EL.s390x",
          "3ES:kernel-0:2.4.21-63.EL.src",
          "3ES:kernel-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-doc-0:2.4.21-63.EL.i386",
          "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
          "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
          "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-source-0:2.4.21-63.EL.i386",
          "3ES:kernel-source-0:2.4.21-63.EL.ia64",
          "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-source-0:2.4.21-63.EL.s390",
          "3ES:kernel-source-0:2.4.21-63.EL.s390x",
          "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-0:2.4.21-63.EL.athlon",
          "3WS:kernel-0:2.4.21-63.EL.i686",
          "3WS:kernel-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-0:2.4.21-63.EL.ia64",
          "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-0:2.4.21-63.EL.s390",
          "3WS:kernel-0:2.4.21-63.EL.s390x",
          "3WS:kernel-0:2.4.21-63.EL.src",
          "3WS:kernel-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-doc-0:2.4.21-63.EL.i386",
          "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-source-0:2.4.21-63.EL.i386",
          "3WS:kernel-source-0:2.4.21-63.EL.ia64",
          "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-source-0:2.4.21-63.EL.s390",
          "3WS:kernel-source-0:2.4.21-63.EL.s390x",
          "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-2848"
        },
        {
          "category": "external",
          "summary": "RHBZ#515423",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515423"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2848",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-2848"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2848",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2848"
        }
      ],
      "release_date": "2009-07-31T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T21:56:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1550"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: execve: must clear current-\u003eclear_child_tid"
    },
    {
      "cve": "CVE-2009-3002",
      "discovery_date": "2009-08-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "519305"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Linux kernel before 2.6.31-rc7 does not initialize certain data structures within getname functions, which allows local users to read the contents of some kernel memory locations by calling getsockname on (1) an AF_APPLETALK socket, related to the atalk_getname function in net/appletalk/ddp.c; (2) an AF_IRDA socket, related to the irda_getname function in net/irda/af_irda.c; (3) an AF_ECONET socket, related to the econet_getname function in net/econet/af_econet.c; (4) an AF_NETROM socket, related to the nr_getname function in net/netrom/af_netrom.c; (5) an AF_ROSE socket, related to the rose_getname function in net/rose/af_rose.c; or (6) a raw CAN socket, related to the raw_getname function in net/can/raw.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: numerous getname() infoleaks",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "CVE-2009-3002 describes a collection of similar information leaks that affect numerous networking protocols.\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4 and 5 did not enable support for the AppleTalk DDP protocol, and therefore were not affected by issue (1).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG did not enable support for IrDA sockets, and therefore were not affected by issue (2).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG did not enable support for the Acorn Econet and AUN protocols, and therefore were not affected by issue (3).\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG did not enable support for the NET/ROM and ROSE protocols, and therefore were not affected by issues (4) and (5).\n\nThe raw_getname() leak was introduced in the Linux kernel version 2.6.25-rc1. The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG therefore were not affected by issue (6).",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:kernel-0:2.4.21-63.EL.athlon",
          "3AS:kernel-0:2.4.21-63.EL.i686",
          "3AS:kernel-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-0:2.4.21-63.EL.ia64",
          "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-0:2.4.21-63.EL.s390",
          "3AS:kernel-0:2.4.21-63.EL.s390x",
          "3AS:kernel-0:2.4.21-63.EL.src",
          "3AS:kernel-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-doc-0:2.4.21-63.EL.i386",
          "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-source-0:2.4.21-63.EL.i386",
          "3AS:kernel-source-0:2.4.21-63.EL.ia64",
          "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-source-0:2.4.21-63.EL.s390",
          "3AS:kernel-source-0:2.4.21-63.EL.s390x",
          "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-0:2.4.21-63.EL.src",
          "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-0:2.4.21-63.EL.athlon",
          "3ES:kernel-0:2.4.21-63.EL.i686",
          "3ES:kernel-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-0:2.4.21-63.EL.ia64",
          "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-0:2.4.21-63.EL.s390",
          "3ES:kernel-0:2.4.21-63.EL.s390x",
          "3ES:kernel-0:2.4.21-63.EL.src",
          "3ES:kernel-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-doc-0:2.4.21-63.EL.i386",
          "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
          "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
          "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-source-0:2.4.21-63.EL.i386",
          "3ES:kernel-source-0:2.4.21-63.EL.ia64",
          "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-source-0:2.4.21-63.EL.s390",
          "3ES:kernel-source-0:2.4.21-63.EL.s390x",
          "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-0:2.4.21-63.EL.athlon",
          "3WS:kernel-0:2.4.21-63.EL.i686",
          "3WS:kernel-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-0:2.4.21-63.EL.ia64",
          "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-0:2.4.21-63.EL.s390",
          "3WS:kernel-0:2.4.21-63.EL.s390x",
          "3WS:kernel-0:2.4.21-63.EL.src",
          "3WS:kernel-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-doc-0:2.4.21-63.EL.i386",
          "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-source-0:2.4.21-63.EL.i386",
          "3WS:kernel-source-0:2.4.21-63.EL.ia64",
          "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-source-0:2.4.21-63.EL.s390",
          "3WS:kernel-source-0:2.4.21-63.EL.s390x",
          "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3002"
        },
        {
          "category": "external",
          "summary": "RHBZ#519305",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519305"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3002",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3002"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3002",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3002"
        }
      ],
      "release_date": "2009-08-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T21:56:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1550"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: numerous getname() infoleaks"
    },
    {
      "cve": "CVE-2009-3547",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2009-10-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "530490"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: fs: pipe.c null pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "3AS:kernel-0:2.4.21-63.EL.athlon",
          "3AS:kernel-0:2.4.21-63.EL.i686",
          "3AS:kernel-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-0:2.4.21-63.EL.ia64",
          "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-0:2.4.21-63.EL.s390",
          "3AS:kernel-0:2.4.21-63.EL.s390x",
          "3AS:kernel-0:2.4.21-63.EL.src",
          "3AS:kernel-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-doc-0:2.4.21-63.EL.i386",
          "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390",
          "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-source-0:2.4.21-63.EL.i386",
          "3AS:kernel-source-0:2.4.21-63.EL.ia64",
          "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3AS:kernel-source-0:2.4.21-63.EL.s390",
          "3AS:kernel-source-0:2.4.21-63.EL.s390x",
          "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-0:2.4.21-63.EL.src",
          "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-0:2.4.21-63.EL.athlon",
          "3ES:kernel-0:2.4.21-63.EL.i686",
          "3ES:kernel-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-0:2.4.21-63.EL.ia64",
          "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-0:2.4.21-63.EL.s390",
          "3ES:kernel-0:2.4.21-63.EL.s390x",
          "3ES:kernel-0:2.4.21-63.EL.src",
          "3ES:kernel-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-doc-0:2.4.21-63.EL.i386",
          "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
          "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390",
          "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
          "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-source-0:2.4.21-63.EL.i386",
          "3ES:kernel-source-0:2.4.21-63.EL.ia64",
          "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
          "3ES:kernel-source-0:2.4.21-63.EL.s390",
          "3ES:kernel-source-0:2.4.21-63.EL.s390x",
          "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-0:2.4.21-63.EL.athlon",
          "3WS:kernel-0:2.4.21-63.EL.i686",
          "3WS:kernel-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-0:2.4.21-63.EL.ia64",
          "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-0:2.4.21-63.EL.s390",
          "3WS:kernel-0:2.4.21-63.EL.s390x",
          "3WS:kernel-0:2.4.21-63.EL.src",
          "3WS:kernel-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
          "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-doc-0:2.4.21-63.EL.i386",
          "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
          "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390",
          "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
          "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
          "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-source-0:2.4.21-63.EL.i386",
          "3WS:kernel-source-0:2.4.21-63.EL.ia64",
          "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
          "3WS:kernel-source-0:2.4.21-63.EL.s390",
          "3WS:kernel-source-0:2.4.21-63.EL.s390x",
          "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
          "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3547"
        },
        {
          "category": "external",
          "summary": "RHBZ#530490",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530490"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3547",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3547"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3547",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3547"
        }
      ],
      "release_date": "2009-10-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-11-03T21:56:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1550"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "3AS:kernel-0:2.4.21-63.EL.athlon",
            "3AS:kernel-0:2.4.21-63.EL.i686",
            "3AS:kernel-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-0:2.4.21-63.EL.ia64",
            "3AS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-0:2.4.21-63.EL.s390",
            "3AS:kernel-0:2.4.21-63.EL.s390x",
            "3AS:kernel-0:2.4.21-63.EL.src",
            "3AS:kernel-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3AS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-doc-0:2.4.21-63.EL.i386",
            "3AS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3AS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390",
            "3AS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3AS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3AS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-source-0:2.4.21-63.EL.i386",
            "3AS:kernel-source-0:2.4.21-63.EL.ia64",
            "3AS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3AS:kernel-source-0:2.4.21-63.EL.s390",
            "3AS:kernel-source-0:2.4.21-63.EL.s390x",
            "3AS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3AS:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-0:2.4.21-63.EL.src",
            "3Desktop:kernel-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.i386",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.ppc64",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-source-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-source-0:2.4.21-63.EL.x86_64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3Desktop:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-0:2.4.21-63.EL.athlon",
            "3ES:kernel-0:2.4.21-63.EL.i686",
            "3ES:kernel-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-0:2.4.21-63.EL.ia64",
            "3ES:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-0:2.4.21-63.EL.s390",
            "3ES:kernel-0:2.4.21-63.EL.s390x",
            "3ES:kernel-0:2.4.21-63.EL.src",
            "3ES:kernel-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3ES:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-doc-0:2.4.21-63.EL.i386",
            "3ES:kernel-doc-0:2.4.21-63.EL.ia64",
            "3ES:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390",
            "3ES:kernel-doc-0:2.4.21-63.EL.s390x",
            "3ES:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3ES:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-source-0:2.4.21-63.EL.i386",
            "3ES:kernel-source-0:2.4.21-63.EL.ia64",
            "3ES:kernel-source-0:2.4.21-63.EL.ppc64",
            "3ES:kernel-source-0:2.4.21-63.EL.s390",
            "3ES:kernel-source-0:2.4.21-63.EL.s390x",
            "3ES:kernel-source-0:2.4.21-63.EL.x86_64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3ES:kernel-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-0:2.4.21-63.EL.athlon",
            "3WS:kernel-0:2.4.21-63.EL.i686",
            "3WS:kernel-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-0:2.4.21-63.EL.ia64",
            "3WS:kernel-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-0:2.4.21-63.EL.s390",
            "3WS:kernel-0:2.4.21-63.EL.s390x",
            "3WS:kernel-0:2.4.21-63.EL.src",
            "3WS:kernel-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-BOOT-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.athlon",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i386",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.i686",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ia64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.s390x",
            "3WS:kernel-debuginfo-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-doc-0:2.4.21-63.EL.i386",
            "3WS:kernel-doc-0:2.4.21-63.EL.ia64",
            "3WS:kernel-doc-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390",
            "3WS:kernel-doc-0:2.4.21-63.EL.s390x",
            "3WS:kernel-doc-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-hugemem-0:2.4.21-63.EL.i686",
            "3WS:kernel-hugemem-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-smp-unsupported-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-source-0:2.4.21-63.EL.i386",
            "3WS:kernel-source-0:2.4.21-63.EL.ia64",
            "3WS:kernel-source-0:2.4.21-63.EL.ppc64",
            "3WS:kernel-source-0:2.4.21-63.EL.s390",
            "3WS:kernel-source-0:2.4.21-63.EL.s390x",
            "3WS:kernel-source-0:2.4.21-63.EL.x86_64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.athlon",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.i686",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia32e",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ia64",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64iseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.ppc64pseries",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.s390x",
            "3WS:kernel-unsupported-0:2.4.21-63.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: fs: pipe.c null pointer dereference"
    }
  ]
}
  ghsa-pp2r-wqw2-9r3r
Vulnerability from github
Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.
{
  "affected": [],
  "aliases": [
    "CVE-2009-1385"
  ],
  "database_specific": {
    "cwe_ids": [],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2009-06-04T16:30:00Z",
    "severity": "HIGH"
  },
  "details": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
  "id": "GHSA-pp2r-wqw2-9r3r",
  "modified": "2022-05-02T03:24:34Z",
  "published": "2022-05-02T03:24:34Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2009:1132"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2009:1157"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2009:1193"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2009:1550"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2010:0079"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/security/cve/CVE-2009-1385"
    },
    {
      "type": "WEB",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
    },
    {
      "type": "WEB",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11598"
    },
    {
      "type": "WEB",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11681"
    },
    {
      "type": "WEB",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8340"
    },
    {
      "type": "WEB",
      "url": "https://rhn.redhat.com/errata/RHSA-2009-1550.html"
    },
    {
      "type": "WEB",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html"
    },
    {
      "type": "WEB",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html"
    },
    {
      "type": "WEB",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html"
    },
    {
      "type": "WEB",
      "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea30e11970a96cfe5e32c03a29332554573b4a10"
    },
    {
      "type": "WEB",
      "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ea30e11970a96cfe5e32c03a29332554573b4a10"
    },
    {
      "type": "WEB",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html"
    },
    {
      "type": "WEB",
      "url": "http://osvdb.org/54892"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/35265"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/35566"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/35623"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/35656"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/35847"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/36051"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/36131"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/36327"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/37471"
    },
    {
      "type": "WEB",
      "url": "http://sourceforge.net/project/shownotes.php?release_id=504022\u0026group_id=42302"
    },
    {
      "type": "WEB",
      "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0111"
    },
    {
      "type": "WEB",
      "url": "http://www.debian.org/security/2009/dsa-1844"
    },
    {
      "type": "WEB",
      "url": "http://www.debian.org/security/2009/dsa-1865"
    },
    {
      "type": "WEB",
      "url": "http://www.intel.com/support/network/sb/CS-030543.htm"
    },
    {
      "type": "WEB",
      "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc8"
    },
    {
      "type": "WEB",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:135"
    },
    {
      "type": "WEB",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:148"
    },
    {
      "type": "WEB",
      "url": "http://www.openwall.com/lists/oss-security/2009/06/03/2"
    },
    {
      "type": "WEB",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1157.html"
    },
    {
      "type": "WEB",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1193.html"
    },
    {
      "type": "WEB",
      "url": "http://www.securityfocus.com/archive/1/505254/100/0/threaded"
    },
    {
      "type": "WEB",
      "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
    },
    {
      "type": "WEB",
      "url": "http://www.securityfocus.com/archive/1/512019/100/0/threaded"
    },
    {
      "type": "WEB",
      "url": "http://www.securityfocus.com/bid/35185"
    },
    {
      "type": "WEB",
      "url": "http://www.ubuntu.com/usn/usn-793-1"
    },
    {
      "type": "WEB",
      "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
    },
    {
      "type": "WEB",
      "url": "http://www.vupen.com/english/advisories/2009/3316"
    }
  ],
  "schema_version": "1.4.0",
  "severity": []
}
  CERTA-2010-AVI-293
Vulnerability from certfr_avis
Plusieurs vulnérabilités ont été corrigées dans VMware ESX. Elles permettent, entre autre, l'élévation de privilèges.
Description
Plusieurs vulnérabilités ont été corrigées dans VMware ESX dont certaines liées à la mise à jour du noyau linux kernel-2.4.21-60.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
VMware ESX 3.5 sans le correctif ESX350-201006401-SG.
| Vendor | Product | Description | 
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
                  
  | 
              |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eVMware ESX 3.5 sans le correctif  ESX350-201006401-SG.\u003c/p\u003e",
  "content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans VMware ESX dont\ncertaines li\u00e9es \u00e0 la mise \u00e0 jour du noyau linux kernel-2.4.21-60.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2009-2692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2692"
    },
    {
      "name": "CVE-2009-1385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
    },
    {
      "name": "CVE-2008-5300",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5300"
    },
    {
      "name": "CVE-2009-1895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
    },
    {
      "name": "CVE-2009-3002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3002"
    },
    {
      "name": "CVE-2009-3547",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3547"
    },
    {
      "name": "CVE-2009-2848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2848"
    },
    {
      "name": "CVE-2008-5029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5029"
    },
    {
      "name": "CVE-2009-2698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2698"
    },
    {
      "name": "CVE-2009-1337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1337"
    }
  ],
  "initial_release_date": "2010-06-28T00:00:00",
  "last_revision_date": "2010-06-28T00:00:00",
  "links": [],
  "reference": "CERTA-2010-AVI-293",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2010-06-28T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Plusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans VMware ESX. Elles\npermettent, entre autre, l\u0027\u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware ESX Server",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 VMware #1022899 du 24 juin 2010",
      "url": "http://kb.vmware.com/kb/1022899"
    }
  ]
}
  CERTA-2009-AVI-513
Vulnerability from certfr_avis
Plusieurs vulnérabilités découvertes dans les produits VMware peuvent être exploitées à distance par un utilisateur malintentionné afin de compromettre le système vulnérable ou encore d'entraver son bon fonctionnement.
Description
Les vulnérabilités présentes dans les produits VMware peuvent être exploitées afin de porter atteinte à l'intégrité et à la confidentialité des données, de réaliser un déni de service, d'injecter et d'exécuter indirectement du code arbitraire, d'élever ses privilèges ou d'exécuter du code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | VMware Server 2.x ; | ||
| VMware | ESXi | VMware ESXi 3.x ; | ||
| VMware | N/A | VMware vMA 4.x. | ||
| VMware | N/A | VMware ESX Server 4.x ; | ||
| VMware | N/A | VMware ESX Server 2.x ; | ||
| VMware | N/A | VMware ESX Server 3.x ; | ||
| VMware | ESXi | VMware ESXi 4.x ; | ||
| VMware | vCenter Server | VMware vCenter Server 4.x ; | ||
| VMware | N/A | VMware VirtualCenter 2.x ; | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
                  
  | 
              |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "VMware Server 2.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware ESXi 3.x ;",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware vMA 4.x.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware ESX Server 4.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware ESX Server 2.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware ESX Server 3.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware ESXi 4.x ;",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware vCenter Server 4.x ;",
      "product": {
        "name": "vCenter Server",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware VirtualCenter 2.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nLes vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans les produits VMware peuvent \u00eatre\nexploit\u00e9es afin de porter atteinte \u00e0 l\u0027int\u00e9grit\u00e9 et \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, de r\u00e9aliser un d\u00e9ni de service, d\u0027injecter et d\u0027ex\u00e9cuter\nindirectement du code arbitraire, d\u0027\u00e9lever ses privil\u00e8ges ou d\u0027ex\u00e9cuter\ndu code arbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2009-2724",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2724"
    },
    {
      "name": "CVE-2009-0676",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0676"
    },
    {
      "name": "CVE-2009-2721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2721"
    },
    {
      "name": "CVE-2008-3143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-3143"
    },
    {
      "name": "CVE-2009-2692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2692"
    },
    {
      "name": "CVE-2009-2406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2406"
    },
    {
      "name": "CVE-2009-1389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
    },
    {
      "name": "CVE-2008-0002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-0002"
    },
    {
      "name": "CVE-2009-1106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1106"
    },
    {
      "name": "CVE-2009-1072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1072"
    },
    {
      "name": "CVE-2008-4307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-4307"
    },
    {
      "name": "CVE-2009-1104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1104"
    },
    {
      "name": "CVE-2009-2407",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2407"
    },
    {
      "name": "CVE-2008-3142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-3142"
    },
    {
      "name": "CVE-2009-1101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1101"
    },
    {
      "name": "CVE-2009-2416",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
    },
    {
      "name": "CVE-2009-1385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
    },
    {
      "name": "CVE-2009-0746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0746"
    },
    {
      "name": "CVE-2009-2673",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
    },
    {
      "name": "CVE-2007-5966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-5966"
    },
    {
      "name": "CVE-2009-2719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2719"
    },
    {
      "name": "CVE-2008-4864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-4864"
    },
    {
      "name": "CVE-2009-2417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2417"
    },
    {
      "name": "CVE-2009-1439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1439"
    },
    {
      "name": "CVE-2009-0322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0322"
    },
    {
      "name": "CVE-2009-1895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
    },
    {
      "name": "CVE-2009-1094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1094"
    },
    {
      "name": "CVE-2009-0748",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0748"
    },
    {
      "name": "CVE-2008-3144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-3144"
    },
    {
      "name": "CVE-2009-0747",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0747"
    },
    {
      "name": "CVE-2009-0580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
    },
    {
      "name": "CVE-2009-1095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1095"
    },
    {
      "name": "CVE-2009-2672",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
    },
    {
      "name": "CVE-2009-0675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0675"
    },
    {
      "name": "CVE-2007-5461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
    },
    {
      "name": "CVE-2009-2670",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
    },
    {
      "name": "CVE-2009-1102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1102"
    },
    {
      "name": "CVE-2009-1630",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1630"
    },
    {
      "name": "CVE-2009-0269",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0269"
    },
    {
      "name": "CVE-2008-3528",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-3528"
    },
    {
      "name": "CVE-2008-5031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5031"
    },
    {
      "name": "CVE-2008-1721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-1721"
    },
    {
      "name": "CVE-2009-1388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1388"
    },
    {
      "name": "CVE-2009-1192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1192"
    },
    {
      "name": "CVE-2009-2720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2720"
    },
    {
      "name": "CVE-2009-0834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
    },
    {
      "name": "CVE-2009-2671",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
    },
    {
      "name": "CVE-2009-2848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2848"
    },
    {
      "name": "CVE-2009-2675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
    },
    {
      "name": "CVE-2008-1232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-1232"
    },
    {
      "name": "CVE-2009-0159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0159"
    },
    {
      "name": "CVE-2009-0778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0778"
    },
    {
      "name": "CVE-2009-2625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
    },
    {
      "name": "CVE-2009-1099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1099"
    },
    {
      "name": "CVE-2009-1252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1252"
    },
    {
      "name": "CVE-2009-2698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2698"
    },
    {
      "name": "CVE-2008-2370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-2370"
    },
    {
      "name": "CVE-2009-0033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
    },
    {
      "name": "CVE-2009-2723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2723"
    },
    {
      "name": "CVE-2009-1107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1107"
    },
    {
      "name": "CVE-2009-2716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2716"
    },
    {
      "name": "CVE-2007-5333",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
    },
    {
      "name": "CVE-2008-1947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-1947"
    },
    {
      "name": "CVE-2009-1105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1105"
    },
    {
      "name": "CVE-2007-6286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-6286"
    },
    {
      "name": "CVE-2009-0028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0028"
    },
    {
      "name": "CVE-2009-1337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1337"
    },
    {
      "name": "CVE-2009-0781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
    },
    {
      "name": "CVE-2009-2414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
    },
    {
      "name": "CVE-2007-2052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-2052"
    },
    {
      "name": "CVE-2009-1336",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1336"
    },
    {
      "name": "CVE-2009-0783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
    },
    {
      "name": "CVE-2008-5515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
    },
    {
      "name": "CVE-2007-4965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965"
    },
    {
      "name": "CVE-2009-1633",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1633"
    },
    {
      "name": "CVE-2009-2722",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2722"
    },
    {
      "name": "CVE-2008-5700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5700"
    },
    {
      "name": "CVE-2009-1103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1103"
    },
    {
      "name": "CVE-2009-1100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1100"
    },
    {
      "name": "CVE-2009-2676",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
    },
    {
      "name": "CVE-2007-5342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
    },
    {
      "name": "CVE-2009-1096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1096"
    },
    {
      "name": "CVE-2009-1098",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1098"
    },
    {
      "name": "CVE-2009-0787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0787"
    },
    {
      "name": "CVE-2008-1887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-1887"
    },
    {
      "name": "CVE-2009-1097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1097"
    },
    {
      "name": "CVE-2009-2847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2847"
    },
    {
      "name": "CVE-2008-2315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-2315"
    },
    {
      "name": "CVE-2009-0696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0696"
    },
    {
      "name": "CVE-2009-2718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2718"
    },
    {
      "name": "CVE-2009-0745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0745"
    },
    {
      "name": "CVE-2009-1093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1093"
    }
  ],
  "initial_release_date": "2009-11-24T00:00:00",
  "last_revision_date": "2009-11-24T00:00:00",
  "links": [],
  "reference": "CERTA-2009-AVI-513",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2009-11-24T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Plusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans les produits VMware peuvent\n\u00eatre exploit\u00e9es \u00e0 distance par un utilisateur malintentionn\u00e9 afin de\ncompromettre le syst\u00e8me vuln\u00e9rable ou encore d\u0027entraver son bon\nfonctionnement.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 VMware du 20 novembre 2009",
      "url": "http://lists.vmware.com/pipermail/security-announce/2009/000070.html"
    }
  ]
}
  CERTA-2009-AVI-256
Vulnerability from certfr_avis
Une vulnérabilité des pilotes de carte réseau Intel PRO/1000 permet de réaliser un déni de service à distance.
Description
Une vulnérabilité présente dans les pilotes de carte réseau Intel PRO/1000 permet à un individu distant de réaliser un déni de service au moyen de paquets réseau spécialement conçus.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Pilote e1000 (pour cartes réseau Intel PRO/1000) versions antérieures à 7.5.5.
| Vendor | Product | Description | 
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
                  
  | 
              |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003ePilote e1000 (pour cartes r\u00e9seau Intel  PRO/1000) versions ant\u00e9rieures \u00e0 7.5.5.\u003c/p\u003e",
  "content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 pr\u00e9sente dans les pilotes de carte r\u00e9seau Intel\nPRO/1000 permet \u00e0 un individu distant de r\u00e9aliser un d\u00e9ni de service au\nmoyen de paquets r\u00e9seau sp\u00e9cialement con\u00e7us.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2009-1385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
    }
  ],
  "initial_release_date": "2009-06-30T00:00:00",
  "last_revision_date": "2009-06-30T00:00:00",
  "links": [],
  "reference": "CERTA-2009-AVI-256",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2009-06-30T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 des pilotes de carte r\u00e9seau \u003cspan class=\"textit\"\u003eIntel\nPRO/1000\u003c/span\u003e permet de r\u00e9aliser un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 du pilote Intel PRO/1000",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel CS-030543 du 25 juin 2009",
      "url": "http://www.intel.com/support/network/sb/CS-030543.htm"
    }
  ]
}
  var-200906-0598
Vulnerability from variot
Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size. (DoS) There is a vulnerability that becomes a condition.Denial of service due to crafted frame size (DoS) There is a possibility of being put into a state. The NFSv4 implementation is one of the distributed file system protocols. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
               VMware Security Advisory
Advisory ID: VMSA-2009-0016 Synopsis: VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components Issue date: 2009-11-20 Updated on: 2009-11-20 (initial release of advisory) CVE numbers: --- JRE --- CVE-2009-1093 CVE-2009-1094 CVE-2009-1095 CVE-2009-1096 CVE-2009-1097 CVE-2009-1098 CVE-2009-1099 CVE-2009-1100 CVE-2009-1101 CVE-2009-1102 CVE-2009-1103 CVE-2009-1104 CVE-2009-1105 CVE-2009-1106 CVE-2009-1107 CVE-2009-2625 CVE-2009-2670 CVE-2009-2671 CVE-2009-2672 CVE-2009-2673 CVE-2009-2675 CVE-2009-2676 CVE-2009-2716 CVE-2009-2718 CVE-2009-2719 CVE-2009-2720 CVE-2009-2721 CVE-2009-2722 CVE-2009-2723 CVE-2009-2724 --- Tomcat --- CVE-2008-5515 CVE-2009-0033 CVE-2009-0580 CVE-2009-0781 CVE-2009-0783 CVE-2008-1232 CVE-2008-1947 CVE-2008-2370 CVE-2007-5333 CVE-2007-5342 CVE-2007-5461 CVE-2007-6286 CVE-2008-0002 --- ntp --- CVE-2009-1252 CVE-2009-0159 --- kernel --- CVE-2008-3528 CVE-2008-5700 CVE-2009-0028 CVE-2009-0269 CVE-2009-0322 CVE-2009-0675 CVE-2009-0676 CVE-2009-0778 CVE-2008-4307 CVE-2009-0834 CVE-2009-1337 CVE-2009-0787 CVE-2009-1336 CVE-2009-1439 CVE-2009-1633 CVE-2009-1072 CVE-2009-1630 CVE-2009-1192 CVE-2007-5966 CVE-2009-1385 CVE-2009-1388 CVE-2009-1389 CVE-2009-1895 CVE-2009-2406 CVE-2009-2407 CVE-2009-2692 CVE-2009-2698 CVE-2009-0745 CVE-2009-0746 CVE-2009-0747 CVE-2009-0748 CVE-2009-2847 CVE-2009-2848 --- python --- CVE-2007-2052 CVE-2007-4965 CVE-2008-1721 CVE-2008-1887 CVE-2008-2315 CVE-2008-3142 CVE-2008-3143 CVE-2008-3144 CVE-2008-4864 CVE-2008-5031 --- bind --- CVE-2009-0696 --- libxml and libxml2 --- CVE-2009-2414 CVE-2009-2416 --- curl -- CVE-2009-2417 --- gnutil --- CVE-2007-2052
- Summary
 
Updated Java JRE packages and Tomcat packages address several security issues. Updates for the ESX Service Console and vMA include kernel, ntp, Python, bind libxml, libxml2, curl and gnutil packages. ntp is also updated for ESXi userworlds.
- Relevant releases
 
vCenter Server 4.0 before Update 1
ESXi 4.0 without patch ESXi400-200911201-UG
ESX 4.0 without patches ESX400-200911201-UG, ESX400-200911223-UG, ESX400-200911232-SG, ESX400-200911233-SG, ESX400-200911234-SG, ESX400-200911235-SG, ESX400-200911237-SG, ESX400-200911238-SG
vMA 4.0 before patch 02
- Problem Description
 
a. JRE Security Update
JRE update to version 1.5.0_20, which addresses multiple security
issues that existed in earlier releases of JRE.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the following names to the security issues fixed in
JRE 1.5.0_18: CVE-2009-1093, CVE-2009-1094, CVE-2009-1095,
CVE-2009-1096, CVE-2009-1097, CVE-2009-1098, CVE-2009-1099,
CVE-2009-1100, CVE-2009-1101, CVE-2009-1102, CVE-2009-1103,
CVE-2009-1104, CVE-2009-1105, CVE-2009-1106, and CVE-2009-1107.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the following names to the security issues fixed in
JRE 1.5.0_20: CVE-2009-2625, CVE-2009-2670, CVE-2009-2671,
CVE-2009-2672, CVE-2009-2673, CVE-2009-2675, CVE-2009-2676,
CVE-2009-2716, CVE-2009-2718, CVE-2009-2719, CVE-2009-2720,
CVE-2009-2721, CVE-2009-2722, CVE-2009-2723, CVE-2009-2724.
The following table lists what action remediates the vulnerability
(column 4) if a solution is available.
VMware         Product   Running  Replace with/
Product        Version   on       Apply Patch
=============  ========  =======  =================
vCenter        4.0       Windows  Update 1
VirtualCenter  2.5       Windows  affected, patch pending
VirtualCenter  2.0.2     Windows  affected, patch pending
Workstation    any       any      not affected
Player         any       any      not affected
Server         2.0       any      affected, patch pending
Server         1.0       any      not affected
ACE            any       any      not affected
Fusion         any       any      not affected
ESXi           any       ESXi     not affected
ESX            4.0       ESX      ESX400-200911223-UG
ESX            3.5       ESX      affected, patch pending
ESX            3.0.3     ESX      affected, patch pending
ESX            2.5.5     ESX      not affected
vMA            4.0       RHEL5    Patch 2 *
- 
vMA JRE is updated to version JRE 1.5.0_21
Notes: These vulnerabilities can be exploited remotely only if the attacker has access to the Service Console network.
Security best practices provided by VMware recommend that the Service Console be isolated from the VM network. Please see http://www.vmware.com/resources/techresources/726 for more information on VMware security best practices. The currently installed version of JRE depends on your patch deployment history. 
b. Update Apache Tomcat version to 6.0.20
Update for VirtualCenter and ESX patch update the Tomcat package to version 6.0.20 which addresses multiple security issues that existed in the previous version of Apache Tomcat.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the following names to the security issues fixed in Apache Tomcat 6.0.20: CVE-2008-5515, CVE-2009-0033, CVE-2009-0580, CVE-2009-0781, CVE-2009-0783.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the following names to the security issues fixed in Apache Tomcat 6.0.18: CVE-2008-1232, CVE-2008-1947, CVE-2008-2370.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the following names to the security issues fixed in Apache Tomcat 6.0.16: CVE-2007-5333, CVE-2007-5342, CVE-2007-5461, CVE-2007-6286, CVE-2008-0002.
The following table lists what action remediates the vulnerability (column 4) if a solution is available.
VMware Product Running Replace with/ Product Version on Apply Patch ======== ======== ======= ======================= vCenter 4.0 Windows Update 1 VirtualCenter 2.5 Windows affected, patch pending VirtualCenter 2.0.2 Windows affected, patch pending
Workstation any any not affected
Player any any not affected
ACE any Windows not affected
Server 2.x any affected, patch pending Server 1.x any not affected
Fusion any Mac OS/X not affected
ESXi any ESXi not affected
ESX 4.0 ESX ESX400-200911223-UG ESX 3.5 ESX affected, patch pending ESX 3.0.3 ESX affected, patch pending ESX 2.5.5 ESX not affected
vMA 4.0 RHEL5 not affected
Notes: These vulnerabilities can be exploited remotely only if the
       attacker has access to the Service Console network.
       Security best practices provided by VMware recommend that the
       Service Console be isolated from the VM network. Please see
       http://www.vmware.com/resources/techresources/726 for more
       information on VMware security best practices.
       The currently installed version of Tomcat depends on
       your patch deployment history.
c. Third party library update for ntp.
The Network Time Protocol (NTP) is used to synchronize a computer's time with a referenced time source.
ESXi 3.5 and ESXi 4.0 have a ntp client that is affected by the following security issue. Note that the same security issue is present in the ESX Service Console as described in section d. of this advisory.
A buffer overflow flaw was discovered in the ntpd daemon's NTPv4 authentication code. If ntpd was configured to use public key cryptography for NTP packet authentication, a remote attacker could use this flaw to send a specially-crafted request packet that could crash ntpd or, potentially, execute arbitrary code with the privileges of the "ntp" user.
The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2009-1252 to this issue.
The NTP security issue identified by CVE-2009-0159 is not relevant for ESXi 3.5 and ESXi 4.0.
The following table lists what action remediates the vulnerability in this component (column 4) if a solution is available.
VMware         Product   Running  Replace with/
Product        Version   on       Apply Patch
=============  ========  =======  =================
vCenter        any       Windows  not affected
hosted *       any       any      not affected
ESXi           4.0       ESXi     ESXi400-200911201-UG
ESXi           3.5       ESXi     affected, patch pending
ESX            4.0       ESX      not affected
ESX            3.5       ESX      not affected
ESX            3.0.3     ESX      not affected
ESX            2.5.5     ESX      not affected
vMA            4.0       RHEL5    not affected
- hosted products are VMware Workstation, Player, ACE, Server, Fusion.
 
d. Service Console update for ntp
Service Console package ntp updated to version ntp-4.2.2pl-9.el5_3.2
The Network Time Protocol (NTP) is used to synchronize a computer's time with a referenced time source.
The Service Console present in ESX is affected by the following security issues.
A buffer overflow flaw was discovered in the ntpd daemon's NTPv4 authentication code. If ntpd was configured to use public key cryptography for NTP packet authentication, a remote attacker could use this flaw to send a specially-crafted request packet that could crash ntpd or, potentially, execute arbitrary code with the privileges of the "ntp" user.
NTP authentication is not enabled by default on the Service Console.
The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2009-1252 to this issue.
A buffer overflow flaw was found in the ntpq diagnostic command. A malicious, remote server could send a specially-crafted reply to an ntpq request that could crash ntpq or, potentially, execute arbitrary code with the privileges of the user running the ntpq command.
The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2009-0159 to this issue.
The following table lists what action remediates the vulnerability in the Service Console (column 4) if a solution is available.
VMware         Product   Running  Replace with/
Product        Version   on       Apply Patch
=============  ========  =======  =================
vCenter        any       Windows  not affected
hosted *       any       any      not affected
ESXi           any       ESXi     not affected
ESX            4.0       ESX      ESX400-200911238-SG
ESX            3.5       ESX      affected, patch pending **
ESX            3.0.3     ESX      affected, patch pending **
ESX            2.5.5     ESX      affected, patch pending **
vMA            4.0       RHEL5    Patch 2
- hosted products are VMware Workstation, Player, ACE, Server, Fusion.
 
** The service consoles of ESX 2.5.5, ESX 3.0.3 and ESX 3.5 are not affected by CVE-2009-1252. The security issue identified by CVE-2009-0159 has a low impact on the service console of ESX 2.5.5, ESX 3.0.3 and ESX 3.5.
e. Updated Service Console package kernel
Updated Service Console package kernel addresses the security
issues below.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2008-3528, CVE-2008-5700, CVE-2009-0028,
CVE-2009-0269, CVE-2009-0322, CVE-2009-0675, CVE-2009-0676,
CVE-2009-0778 to the security issues fixed in kernel
2.6.18-128.1.6.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2008-4307, CVE-2009-0834, CVE-2009-1337,
CVE-2009-0787, CVE-2009-1336 to the security issues fixed in
kernel 2.6.18-128.1.10.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2009-1439, CVE-2009-1633, CVE-2009-1072,
CVE-2009-1630, CVE-2009-1192 to the security issues fixed in
kernel 2.6.18-128.1.14.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2007-5966, CVE-2009-1385, CVE-2009-1388,
CVE-2009-1389, CVE-2009-1895, CVE-2009-2406, CVE-2009-2407 to the
security issues fixed in kernel 2.6.18-128.4.1.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2009-2692, CVE-2009-2698 to the
security issues fixed in kernel 2.6.18-128.7.1.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2009-0745, CVE-2009-0746, CVE-2009-0747,
CVE-2009-0748, CVE-2009-2847, CVE-2009-2848 to the security issues
fixed in kernel 2.6.18-164.
The following table lists what action remediates the vulnerability
(column 4) if a solution is available.
VMware         Product   Running  Replace with/
Product        Version   on       Apply Patch
=============  ========  =======  =================
vCenter        any       Windows  not applicable
hosted *       any       any      not applicable
ESXi           any       ESXi     not applicable
ESX            4.0       ESX      ESX400-200911201-UG
ESX            3.5       ESX      not applicable
ESX            3.0.3     ESX      not applicable
ESX            2.5.5     ESX      not applicable
vMA            4.0       RHEL5    Patch 2 **
- hosted products are VMware Workstation, Player, ACE, Server, Fusion.
 
** vMA is updated to kernel version 2.6.18-164.
f. Updated Service Console package python
Service Console package Python update to version 2.4.3-24.el5.
When the assert() system call was disabled, an input sanitization
flaw was revealed in the Python string object implementation that
led to a buffer overflow. The missing check for negative size values
meant the Python memory allocator could allocate less memory than
expected. This could result in arbitrary code execution with the
Python interpreter's privileges.
Multiple buffer and integer overflow flaws were found in the Python
Unicode string processing and in the Python Unicode and string
object implementations. An attacker could use these flaws to cause
a denial of service.
Multiple integer overflow flaws were found in the Python imageop
module. If a Python application used the imageop module to
process untrusted images, it could cause the application to
disclose sensitive information, crash or, potentially, execute
arbitrary code with the Python interpreter's privileges.
Multiple integer underflow and overflow flaws were found in the
Python snprintf() wrapper implementation. An attacker could use
these flaws to cause a denial of service (memory corruption).
Multiple integer overflow flaws were found in various Python
modules. An attacker could use these flaws to cause a denial of
service.
An integer signedness error, leading to a buffer overflow, was
found in the Python zlib extension module. If a Python application
requested the negative byte count be flushed for a decompression
stream, it could cause the application to crash or, potentially,
execute arbitrary code with the Python interpreter's privileges.
A flaw was discovered in the strxfrm() function of the Python
locale module. Strings generated by this function were not properly
NULL-terminated, which could possibly cause disclosure of data
stored in the memory of a Python application using this function.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2007-2052 CVE-2007-4965 CVE-2008-1721
CVE-2008-1887 CVE-2008-2315 CVE-2008-3142 CVE-2008-3143
CVE-2008-3144 CVE-2008-4864 CVE-2008-5031 to these issues.
The following table lists what action remediates the vulnerability
(column 4) if a solution is available.
VMware         Product   Running  Replace with/
Product        Version   on       Apply Patch
=============  ========  =======  =================
vCenter        any       Windows  not applicable
hosted *       any       any      not applicable
ESXi           any       ESXi     not applicable
ESX            4.0       ESX      ESX400-200911235-SG
ESX            3.5       ESX      affected, patch pending
ESX            3.0.3     ESX      affected, patch pending
ESX            2.5.5     ESX      affected, patch pending
vMA            4.0       RHEL5    Patch 2
- hosted products are VMware Workstation, Player, ACE, Server, Fusion.
 
g. Updated Service Console package bind
Service Console package bind updated to version 9.3.6-4.P1.el5
The Berkeley Internet Name Domain (BIND) is an implementation of the
Domain Name System (DNS) protocols. BIND includes a DNS server
(named); a resolver library (routines for applications to use when
interfacing with DNS); and tools for verifying that the DNS server
is operating correctly.
A flaw was found in the way BIND handles dynamic update message
packets containing the "ANY" record type. A remote attacker could
use this flaw to send a specially-crafted dynamic update packet
that could cause named to exit with an assertion failure.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2009-0696 to this issue.
The following table lists what action remediates the vulnerability
(column 4) if a solution is available.
VMware         Product   Running  Replace with/
Product        Version   on       Apply Patch
=============  ========  =======  =================
vCenter        any       Windows  not applicable
hosted *       any       any      not applicable
ESXi           any       ESXi     not applicable
ESX            4.0       ESX      ESX400-200911237-SG
ESX            3.5       ESX      affected, patch pending
ESX            3.0.3     ESX      affected, patch pending
ESX            2.5.5     ESX      affected, patch pending
vMA            4.0       RHEL5    Patch 2
- hosted products are VMware Workstation, Player, ACE, Server, Fusion.
 
h. Updated Service Console package libxml2
Service Console package libxml2 updated to version 2.6.26-2.1.2.8.
libxml is a library for parsing and manipulating XML files. A
Document Type Definition (DTD) defines the legal syntax (and also
which elements can be used) for certain types of files, such as XML
files.
A stack overflow flaw was found in the way libxml processes the
root XML document element definition in a DTD. A remote attacker
could provide a specially-crafted XML file, which once opened by a
local, unsuspecting user, would lead to denial of service.
Multiple use-after-free flaws were found in the way libxml parses
the Notation and Enumeration attribute types. A remote attacker
could provide a specially-crafted XML file, which once opened by a
local, unsuspecting user, would lead to denial of service.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2009-2414 and CVE-2009-2416 to these
issues.
The following table lists what action remediates the vulnerability
(column 4) if a solution is available.
VMware         Product   Running  Replace with/
Product        Version   on       Apply Patch
=============  ========  =======  =================
vCenter        any       Windows  not applicable
hosted *       any       any      not applicable
ESXi           any       ESXi     not applicable
ESX            4.0       ESX      ESX400-200911234-SG
ESX            3.5       ESX      affected, patch pending
ESX            3.0.3     ESX      affected, patch pending
ESX            2.5.5     ESX      affected, patch pending
vMA            4.0       RHEL5    Patch 2
- hosted products are VMware Workstation, Player, ACE, Server, Fusion.
 
i. Updated Service Console package curl
Service Console package curl updated to version 7.15.5-2.1.el5_3.5
A cURL is affected by the previously published "null prefix attack",
caused by incorrect handling of NULL characters in X.509
certificates. If an attacker is able to get a carefully-crafted
certificate signed by a trusted Certificate Authority, the attacker
could use the certificate during a man-in-the-middle attack and
potentially confuse cURL into accepting it by mistake.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2009-2417 to this issue
The following table lists what action remediates the vulnerability
(column 4) if a solution is available.
VMware         Product   Running  Replace with/
Product        Version   on       Apply Patch
=============  ========  =======  =================
vCenter        any       Windows  not applicable
hosted *       any       any      not applicable
ESXi           any       ESXi     not applicable
ESX            4.0       ESX      ESX400-200911232-SG
ESX            3.5       ESX      not affected
ESX            3.0.3     ESX      not affected
ESX            2.5.5     ESX      not affected
vMA            4.0       RHEL5    Patch 2
- hosted products are VMware Workstation, Player, ACE, Server, Fusion.
 
j. Updated Service Console package gnutls
Service Console package gnutil updated to version 1.4.1-3.el5_3.5
A flaw was discovered in the way GnuTLS handles NULL characters in
certain fields of X.509 certificates. If an attacker is able to get
a carefully-crafted certificate signed by a Certificate Authority
trusted by an application using GnuTLS, the attacker could use the
certificate during a man-in-the-middle attack and potentially
confuse the application into accepting it by mistake.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2009-2730 to this issue
The following table lists what action remediates the vulnerability
(column 4) if a solution is available.
VMware         Product   Running  Replace with/
Product        Version   on       Apply Patch
=============  ========  =======  =================
vCenter        any       Windows  not applicable
hosted *       any       any      not applicable
ESXi           any       ESXi     not applicable
ESX            4.0       ESX      ESX400-200911233-SG
ESX            3.5       ESX      not affected
ESX            3.0.3     ESX      not affected
ESX            2.5.5     ESX      not affected
vMA            4.0       RHEL5    Patch 2
- 
hosted products are VMware Workstation, Player, ACE, Server, Fusion.
 - 
Solution
 
Please review the patch/release notes for your product and version and verify the md5sum of your downloaded file.
VMware vCenter Server 4 Update 1
Version 4.0 Update 1 Build Number 208156 Release Date 2009/11/19 Type Product Binaries http://downloads.vmware.com/download/download.do?downloadGroup=VC40U1
VMware vCenter Server 4 and modules File size: 1.8 GB File type: .iso MD5SUM: 057d55b32eb27fe5f3e01bc8d3df3bc5 SHA1SUM: c90134418c2e4d3d6637d8bee44261300ad95ec1
VMware vCenter Server 4 and modules File size: 1.5 GB File type: .zip MD5SUM: f843d9c19795eb3bc5a77f5c545468a8 SHA1SUM: 9a7abd8e70bd983151e2ee40e1b3931525c4480c
VMware vSphere Client and Host Update Utility File size: 113.8 MB File type: .exe MD5SUM: 6cc6b2c958e7e9529c284e48dfae22a9 SHA1SUM: f4c19c63a75d93cffc57b170066358160788c959
VMware vCenter Converter BootCD File size: 98.8 MB File type: .zip MD5SUM: 3df94eb0e93de76b0389132ada2a3799 SHA1SUM: 5d7c04e4f9f8ae25adc8de5963fefd8a4c92464c
VMware vCenter Converter CLI (Linux) File size: 36.9 MB File type: .tar.gz MD5SUM: 3766097563936ba5e03e87e898f6bd48 SHA1SUM: 36d485bdb5eb279296ce8c8523df04bfb12a2cb4
ESXi 4.0 Update 1
ESXi400-200911201-UG
https://hostupdate.vmware.com/software/VUM/OFFLINE/release-155-20091116-013169/ESXi-4.0.0-update01.zip md5sum:c6fdd6722d9e5cacb280bdcc2cca0627 sha1sum:de9d4875f86b6493f9da991a8cff37784215db2e http://kb.vmware.com/kb/1014886
NOTE: The three ESXi patches for Firmware, VMware Tools, and the VI Client "C" are contained in a single download file.
ESX 4.0 Update 1
https://hostupdate.vmware.com/software/VUM/OFFLINE/release-158-20091118-187517/ESX-4.0.0-update01.zip md5sum: 68934321105c34dcda4cbeeab36a2b8f sha1sum: 0d8ae58cf9143d5c7113af9692dea11ed2dd864b http://kb.vmware.com/kb/1014842
To install an individual bulletin use esxupdate with the -b option. esxupdate --bundle=ESX-4.0.0-update01.zip -b ESX400-200911223-UG -b ESX400-200911238-SG -b ESX400-200911201-UG -b ESX400-200911235-SG -b ESX400-200911237-SG -b ESX400-200911234-SG -b ESX400-200911232-SG -b ESX400-200911233-SG update
- References
 
CVE numbers --- JRE --- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1093 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1094 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1095 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1096 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1097 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1098 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1099 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1100 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1101 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1102 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1103 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1104 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1105 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1106 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1107 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2670 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2671 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2672 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2673 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2675 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2676 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2716 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2718 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2719 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2720 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2721 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2722 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2723 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2724 --- Tomcat --- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5515 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0033 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0580 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0781 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0783 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1232 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1947 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2370 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5333 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5342 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5461 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6286 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0002 --- ntp --- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0159 --- kernel --- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3528 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5700 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0028 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0269 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0322 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0675 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0676 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0778 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4307 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0834 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1337 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0787 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1336 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1439 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1633 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1072 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1630 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1192 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5966 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1385 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1388 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1389 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1895 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2406 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2407 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2692 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2698 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0745 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0746 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0747 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0748 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2847 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2848 --- python --- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2052 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4965 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1721 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1887 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2315 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3142 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3143 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3144 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4864 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5031 --- bind --- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0696 --- libxml and libxml2 --- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2414 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2416 --- curl -- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417 --- gnutil --- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2052
- Change log
 
2009-11-20 VMSA-2009-0016 Initial security advisory after release of vCenter 4.0 Update 1 and ESX 4.0 Update 1 on 2009-11-19 and release of vMA Patch 2 on 2009-11-23.
- Contact
 
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
- security-announce at lists.vmware.com
 - bugtraq at securityfocus.com
 - full-disclosure at lists.grok.org.uk
 
E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055
VMware Security Center http://www.vmware.com/security
VMware security response policy http://www.vmware.com/support/policies/security_response.html
General support life cycle policy http://www.vmware.com/support/policies/eos.html
VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/lifecycle/
Copyright 2009 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iEYEARECAAYFAksHAooACgkQS2KysvBH1xmQMACfTEcnuPanvucXPmgJCTT054o+ dtoAniXz+9xLskrkPr3oUzAcDeV729WG =wSRz -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA-1844-1 security@debian.org http://www.debian.org/security/ Dann Frazier July 28, 2009 http://www.debian.org/security/faq
Package : linux-2.6.24 Vulnerability : denial of service/privilege escalation Problem type : local/remote Debian-specific: no CVE Id(s) : CVE-2009-1385 CVE-2009-1389 CVE-2009-1630 CVE-2009-1633 CVE-2009-1895 CVE-2009-1914 CVE-2009-1961 CVE-2009-2406 CVE-2009-2407
Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation.
CVE-2009-1895
Julien Tinnes and Tavis Ormandy reported and issue in the Linux
vulnerability code. Local users can take advantage of a setuid
binary that can either be made to dereference a NULL pointer or
drop privileges and return control to the user.
CVE-2009-1961
Miklos Szeredi reported an issue in the ocfs2 filesystem.
CVE-2009-2406 CVE-2009-2407
Ramon de Carvalho Valle discovered two issues with the eCryptfs
layered filesystem using the fsfuzzer utility.
For the stable distribution (etch), these problems have been fixed in version 2.6.24-6~etchnhalf.8etch2.
We recommend that you upgrade your linux-2.6.24 packages.
Note: Debian 'etch' includes linux kernel packages based upon both the 2.6.18 and 2.6.24 linux releases. All known security issues are carefully tracked against both packages and both packages will receive security updates until security support for Debian 'etch' concludes. However, given the high frequency at which low-severity security issues are discovered in the kernel and the resource requirements of doing an update, lower severity 2.6.18 and 2.6.24 updates will typically release in a staggered or "leap-frog" fashion.
Upgrade instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.8etch2.diff.gz Size/MD5 checksum: 4046697 0c540aa51d64fd0f41fefda0370a7d57 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.8etch2.dsc Size/MD5 checksum: 5117 8149bb152305e615760fd5accc516b17 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24.orig.tar.gz Size/MD5 checksum: 59630522 6b8751d1eb8e71498ba74bbd346343af
Architecture independent packages:
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-patch-debian-2.6.24_2.6.24-6~etchnhalf.8etch2_all.deb Size/MD5 checksum: 931690 8230f79880ab579b104e9b34029cc97d http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-manual-2.6.24_2.6.24-6~etchnhalf.8etch2_all.deb Size/MD5 checksum: 1572166 59bdbfc8850a9eb4c7f09229f8481a04 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-source-2.6.24_2.6.24-6~etchnhalf.8etch2_all.deb Size/MD5 checksum: 46892520 c736086affec0e829b80074008edc96d http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-support-2.6.24-etchnhalf.1_2.6.24-6~etchnhalf.8etch2_all.deb Size/MD5 checksum: 97696 ac7c8e4af4d15f8e77817f3a2060621e http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-doc-2.6.24_2.6.24-6~etchnhalf.8etch2_all.deb Size/MD5 checksum: 4469630 76391a2afe93b14ef942260a2ab0f6c4 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-tree-2.6.24_2.6.24-6~etchnhalf.8etch2_all.deb Size/MD5 checksum: 82766 fccf13a8baefeb96443c00718b47178a
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.8etch2_alpha.deb Size/MD5 checksum: 26737560 705e6c1f456e523e4cd6e2199247ad8a http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.8etch2_alpha.deb Size/MD5 checksum: 27342178 b22b7be9f15a3fcd569e83b0981c7b2b http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_alpha.deb Size/MD5 checksum: 3454340 5d9c4195f523265e691a73d165a32bd5 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.8etch2_alpha.deb Size/MD5 checksum: 331144 9b199341a9906f69b92956bee989678f http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.8etch2_alpha.deb Size/MD5 checksum: 330548 2e97270481c6406f4703f7ffc642a306 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-alpha_2.6.24-6~etchnhalf.8etch2_alpha.deb Size/MD5 checksum: 82254 6ef54422427a87fb7013208abbb90bfe http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.8etch2_alpha.deb Size/MD5 checksum: 26758348 3fa44a2c192d5296abff11160c4143f7 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_alpha.deb Size/MD5 checksum: 82234 2d73cbb156467a0e189b66d64d725957 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.8etch2_alpha.deb Size/MD5 checksum: 332176 8abd6e28989d5ffa359dbdf523b8802a
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_amd64.deb Size/MD5 checksum: 82232 f31859776e8c538793ce7bc12e4d16e6 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-amd64_2.6.24-6~etchnhalf.8etch2_amd64.deb Size/MD5 checksum: 82238 0dd51e0668293dc4a112ba7c177a2d62 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.8etch2_amd64.deb Size/MD5 checksum: 355216 e912a184ffa55eefcbf4d075575f956b http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_amd64.deb Size/MD5 checksum: 3649934 25d6d6f81163cd422b987cffe8555482 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.8etch2_amd64.deb Size/MD5 checksum: 19596152 128c3dcd4b54fbca2a8cccf553b15c15
arm architecture (ARM)
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.8etch2_arm.deb Size/MD5 checksum: 308764 081a21f64a1939858fd628b2b17b1e9d http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_arm.deb Size/MD5 checksum: 82362 a02c06864fb8adb347c7b3b83707ec71 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_arm.deb Size/MD5 checksum: 3937452 4296fde893b88cba41a5164cd6c68266 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.8etch2_arm.deb Size/MD5 checksum: 297832 882e93119837e060496995474bfbde0c http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-arm_2.6.24-6~etchnhalf.8etch2_arm.deb Size/MD5 checksum: 82388 5682b9cb3c9efdf951541c5e951858d5 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.8etch2_arm.deb Size/MD5 checksum: 9356202 12691f5684650f5f808b4ccc3d77e6f6 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.8etch2_arm.deb Size/MD5 checksum: 10777668 be1c3aa597e81f449a1712c059b6d219 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.8etch2_arm.deb Size/MD5 checksum: 10786276 fdfef0d9f0a0f740cdf096efe4076849 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.8etch2_arm.deb Size/MD5 checksum: 306278 243cc2aef642ad3dc3e6faa9f5b7d2ac
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.8etch2_hppa.deb Size/MD5 checksum: 259166 403c84cc8eec53736e11babcd7133c36 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-hppa_2.6.24-6~etchnhalf.8etch2_hppa.deb Size/MD5 checksum: 82390 c1e6ec2b43d6dc4849ab58fcca7708fd http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.8etch2_hppa.deb Size/MD5 checksum: 257800 dcf392b46aaabf4187d0b739d7b3f0b6 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_hppa.deb Size/MD5 checksum: 82356 e67f07544c8505aebf46d0fc5cc6ff9b http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.8etch2_hppa.deb Size/MD5 checksum: 258558 a2e28e8a24b42aa4f092218fdb7b24b0 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.8etch2_hppa.deb Size/MD5 checksum: 14371812 91a757a164d87fcca9b7c8dcf9737e52 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.8etch2_hppa.deb Size/MD5 checksum: 261468 72a0d875029ef878bcfa7734ad0e3221 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_hppa.deb Size/MD5 checksum: 3444724 e4cbc7652241146662a324980caf28e8 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.8etch2_hppa.deb Size/MD5 checksum: 14830286 ee2c1dd21c02e82c845897b92fc44d18 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.8etch2_hppa.deb Size/MD5 checksum: 13846760 3133b7187049be153f3d946556c58d5a http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.8etch2_hppa.deb Size/MD5 checksum: 13335008 a71482e5f95d01ae60ef6f9e84851905
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.8etch2_i386.deb Size/MD5 checksum: 19345260 c8d133c7df467610a2b58b02d437f140 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.8etch2_i386.deb Size/MD5 checksum: 19349370 99465914e158a8a8095d704c7a4eca58 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_i386.deb Size/MD5 checksum: 82350 eb75675cf418a8fe18a45cf78e113b14 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.8etch2_i386.deb Size/MD5 checksum: 19589510 ed83c2d0ba92a0f4b5fb5daed6b86d5c http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.8etch2_i386.deb Size/MD5 checksum: 347746 23befd72e069faf404ede7a276b78311 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_i386.deb Size/MD5 checksum: 3647494 9cf283a4c89c8281db35e5fb2ace4335 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-i386_2.6.24-6~etchnhalf.8etch2_i386.deb Size/MD5 checksum: 82384 199633269844e3e36cf936f5a63857a7 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.8etch2_i386.deb Size/MD5 checksum: 361018 4f7299551139e79ad329057ff07de93d http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.8etch2_i386.deb Size/MD5 checksum: 359956 5272e0df584721713692ccb80e8fdc45 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.8etch2_i386.deb Size/MD5 checksum: 361502 4c9a0586154b5fce6d50610d6728bf75 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.8etch2_i386.deb Size/MD5 checksum: 19278068 41f6b91dceeaba5592a15bdbb4170c3a
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_ia64.deb Size/MD5 checksum: 82360 e96d164aa97cbda5c4e0d4a4d8d47298 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_ia64.deb Size/MD5 checksum: 3570154 a7bdb15fd5dc46ea33b570390700255a http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.8etch2_ia64.deb Size/MD5 checksum: 32289122 8a66a1efccab804aece0f9c9f9a0c2c3 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-ia64_2.6.24-6~etchnhalf.8etch2_ia64.deb Size/MD5 checksum: 82378 11c070123743f3060aee864a6fa7621e http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.8etch2_ia64.deb Size/MD5 checksum: 322394 7e68b691385f67de57eca947718b3cf3 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.8etch2_ia64.deb Size/MD5 checksum: 32112122 81952edc15d24552bc7e0e250d4e4c2f http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.8etch2_ia64.deb Size/MD5 checksum: 322756 0332b3131abca0dde23a3980e3269d6a
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.8etch2_mips.deb Size/MD5 checksum: 22151540 85f675d6aa5e858c776b25ed7b55fd01 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.8etch2_mips.deb Size/MD5 checksum: 17152584 968f51589e2246eb98d54f8f7a0deac3 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.8etch2_mips.deb Size/MD5 checksum: 246524 7d37dee7fa5f20d5484a054697944a4a http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.8etch2_mips.deb Size/MD5 checksum: 11958562 189d907c882ca1f971e5df5b020db861 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.8etch2_mips.deb Size/MD5 checksum: 246320 9b22546464feae45ee05c1318ce4eeb1 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.8etch2_mips.deb Size/MD5 checksum: 214790 9f3182d818ff7b6a05993763a6120725 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.8etch2_mips.deb Size/MD5 checksum: 17168120 bc71f4391f0b74712a77ce0a98104c42 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_mips.deb Size/MD5 checksum: 82240 56ffbcabce3c1df699ab5005b86b5fcb http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.8etch2_mips.deb Size/MD5 checksum: 10524568 1dcc5f02fea750b73b3d26bbf9436744 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.8etch2_mips.deb Size/MD5 checksum: 309414 2f3e51dd53a0aee437acd14822bdc812 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-mips_2.6.24-6~etchnhalf.8etch2_mips.deb Size/MD5 checksum: 82294 9d3e3e23c0fc8a0f1e1841e28fd3a2e2 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_mips.deb Size/MD5 checksum: 3803692 496de2fac6b2631145112d3df8c30a74 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.8etch2_mips.deb Size/MD5 checksum: 309366 ad8430704237cac6706abefb3cb3a66a http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.8etch2_mips.deb Size/MD5 checksum: 225310 6f208c9d5eada9b92d3e98530a7421ab http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.8etch2_mips.deb Size/MD5 checksum: 27775866 480af1976cfb2ad886bbeab57828e0a9
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.8etch2_mipsel.deb Size/MD5 checksum: 26985726 697670a3bb624d4d3d78f46f3dd1ffa0 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.8etch2_mipsel.deb Size/MD5 checksum: 16630534 64876417bfc90be839f742b7f3df4017 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-mipsel_2.6.24-6~etchnhalf.8etch2_mipsel.deb Size/MD5 checksum: 82296 3b389589e0d350fd94e1e6a55064b597 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.8etch2_mipsel.deb Size/MD5 checksum: 246006 6b907d81792642929e73f8f7138a0686 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_mipsel.deb Size/MD5 checksum: 82244 06ea877ec50d7981c308674e878de0fd http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.8etch2_mipsel.deb Size/MD5 checksum: 21734936 1f58a04e3f3e233fc379f7585b37f67c http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.8etch2_mipsel.deb Size/MD5 checksum: 309876 33999e485bc68c26f1355c34591fa9d1 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.8etch2_mipsel.deb Size/MD5 checksum: 246316 f5ee5c81b6f69590e7483c63914aa4f1 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.8etch2_mipsel.deb Size/MD5 checksum: 13317230 d5c0090dd1f3487c1a1b98e663d302a9 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_mipsel.deb Size/MD5 checksum: 3803662 c04871193e6cd5fe88e7d757fe94dc15 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.8etch2_mipsel.deb Size/MD5 checksum: 246138 83d394f1c4638687b1bd71213d6fc9fd http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.8etch2_mipsel.deb Size/MD5 checksum: 16566994 4ad893a3f64121974125e7df7a246c32 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.8etch2_mipsel.deb Size/MD5 checksum: 308542 d1aa85d73a85243f9e11e6d319829560
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.8etch2_powerpc.deb Size/MD5 checksum: 17459600 932f0c6e71fa2a92bcbf91245d4a6f34 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.8etch2_powerpc.deb Size/MD5 checksum: 19195098 3894f438fae8ccd897ae1b193e05a06c http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.8etch2_powerpc.deb Size/MD5 checksum: 19486104 e186a5e57fc6ef416a9f0611b4e32b00 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.8etch2_powerpc.deb Size/MD5 checksum: 321892 920d908f2b7f39a4ea245a452707de9c http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.8etch2_powerpc.deb Size/MD5 checksum: 321508 053a1e68eb59bc3616762c77c478b77c http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_powerpc.deb Size/MD5 checksum: 3672616 9480b5733676cd5d73e984cd6b36cdb2 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.8etch2_powerpc.deb Size/MD5 checksum: 21169994 225176293c099a0a66a6e427f8f342c9 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.8etch2_powerpc.deb Size/MD5 checksum: 321100 ed5daac657617ab8ea09dedbbd5825e9 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_powerpc.deb Size/MD5 checksum: 82240 d5758f3021b63ba5a46f4bb59a0264bd http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-powerpc_2.6.24-6~etchnhalf.8etch2_powerpc.deb Size/MD5 checksum: 82278 68134af3769b6654c610701382a41932 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.8etch2_powerpc.deb Size/MD5 checksum: 294694 6e01dfd311f1094cb5cf39e6ab13030f
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390-tape_2.6.24-6~etchnhalf.8etch2_s390.deb Size/MD5 checksum: 1502142 d742c3ccecaeae89dd72efa337ad8d77 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.8etch2_s390.deb Size/MD5 checksum: 194364 95a4fc8d1329f3926c95d0d866ea95c1 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_s390.deb Size/MD5 checksum: 3429940 46b5705e72023ec8eabbeaaae179df0f http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.8etch2_s390.deb Size/MD5 checksum: 194060 0c71ba7ea8c4108e88ce439c83e36101 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_s390.deb Size/MD5 checksum: 82228 f6a160399eb50aed5c7ce0a802977eec http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-s390_2.6.24-6~etchnhalf.8etch2_s390.deb Size/MD5 checksum: 82242 20fa5214b693fd929327b65dff5ec749 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.8etch2_s390.deb Size/MD5 checksum: 7200766 c6697bcd7109bad0fd2742368bfc7173 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.8etch2_s390.deb Size/MD5 checksum: 6950228 2c118466985f0d41c074e3d7ae019d4e
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_sparc.deb Size/MD5 checksum: 82354 917940e7cc2b2ae64b7b13119c8d5cdf http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.8etch2_sparc.deb Size/MD5 checksum: 263544 e8b14218397904ab5f792a659c713900 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.8etch2_sparc.deb Size/MD5 checksum: 13317316 74c832fd75da1e42442c1fc2fb985454 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_sparc.deb Size/MD5 checksum: 3650988 92f721bff0660a92cff31845e3db2b09 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.8etch2_sparc.deb Size/MD5 checksum: 261690 519b6d40d8fc3af21f475b10bfaef609 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-sparc_2.6.24-6~etchnhalf.8etch2_sparc.deb Size/MD5 checksum: 82374 8ff85603936f91294ec959d8fbca1db5 http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.8etch2_sparc.deb Size/MD5 checksum: 13019920 db00ad3ea888c38b94f6e9c2aebbd834
These changes will probably be included in the oldstable distribution on its next update. =========================================================== Ubuntu Security Notice USN-793-1 July 02, 2009 linux, linux-source-2.6.15 vulnerabilities CVE-2009-1072, CVE-2009-1184, CVE-2009-1192, CVE-2009-1242, CVE-2009-1265, CVE-2009-1336, CVE-2009-1337, CVE-2009-1338, CVE-2009-1360, CVE-2009-1385, CVE-2009-1439, CVE-2009-1630, CVE-2009-1633, CVE-2009-1914, CVE-2009-1961 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS Ubuntu 8.04 LTS Ubuntu 8.10 Ubuntu 9.04
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS: linux-image-2.6.15-54-386 2.6.15-54.77 linux-image-2.6.15-54-686 2.6.15-54.77 linux-image-2.6.15-54-amd64-generic 2.6.15-54.77 linux-image-2.6.15-54-amd64-k8 2.6.15-54.77 linux-image-2.6.15-54-amd64-server 2.6.15-54.77 linux-image-2.6.15-54-amd64-xeon 2.6.15-54.77 linux-image-2.6.15-54-hppa32 2.6.15-54.77 linux-image-2.6.15-54-hppa32-smp 2.6.15-54.77 linux-image-2.6.15-54-hppa64 2.6.15-54.77 linux-image-2.6.15-54-hppa64-smp 2.6.15-54.77 linux-image-2.6.15-54-itanium 2.6.15-54.77 linux-image-2.6.15-54-itanium-smp 2.6.15-54.77 linux-image-2.6.15-54-k7 2.6.15-54.77 linux-image-2.6.15-54-mckinley 2.6.15-54.77 linux-image-2.6.15-54-mckinley-smp 2.6.15-54.77 linux-image-2.6.15-54-powerpc 2.6.15-54.77 linux-image-2.6.15-54-powerpc-smp 2.6.15-54.77 linux-image-2.6.15-54-powerpc64-smp 2.6.15-54.77 linux-image-2.6.15-54-server 2.6.15-54.77 linux-image-2.6.15-54-server-bigiron 2.6.15-54.77 linux-image-2.6.15-54-sparc64 2.6.15-54.77 linux-image-2.6.15-54-sparc64-smp 2.6.15-54.77
Ubuntu 8.04 LTS: linux-image-2.6.24-24-386 2.6.24-24.55 linux-image-2.6.24-24-generic 2.6.24-24.55 linux-image-2.6.24-24-hppa32 2.6.24-24.55 linux-image-2.6.24-24-hppa64 2.6.24-24.55 linux-image-2.6.24-24-itanium 2.6.24-24.55 linux-image-2.6.24-24-lpia 2.6.24-24.55 linux-image-2.6.24-24-lpiacompat 2.6.24-24.55 linux-image-2.6.24-24-mckinley 2.6.24-24.55 linux-image-2.6.24-24-openvz 2.6.24-24.55 linux-image-2.6.24-24-powerpc 2.6.24-24.55 linux-image-2.6.24-24-powerpc-smp 2.6.24-24.55 linux-image-2.6.24-24-powerpc64-smp 2.6.24-24.55 linux-image-2.6.24-24-rt 2.6.24-24.55 linux-image-2.6.24-24-server 2.6.24-24.55 linux-image-2.6.24-24-sparc64 2.6.24-24.55 linux-image-2.6.24-24-sparc64-smp 2.6.24-24.55 linux-image-2.6.24-24-virtual 2.6.24-24.55 linux-image-2.6.24-24-xen 2.6.24-24.55
Ubuntu 8.10: linux-image-2.6.27-14-generic 2.6.27-14.35 linux-image-2.6.27-14-server 2.6.27-14.35 linux-image-2.6.27-14-virtual 2.6.27-14.35
Ubuntu 9.04: linux-image-2.6.28-13-generic 2.6.28-13.45 linux-image-2.6.28-13-imx51 2.6.28-13.45 linux-image-2.6.28-13-iop32x 2.6.28-13.45 linux-image-2.6.28-13-ixp4xx 2.6.28-13.45 linux-image-2.6.28-13-lpia 2.6.28-13.45 linux-image-2.6.28-13-server 2.6.28-13.45 linux-image-2.6.28-13-versatile 2.6.28-13.45 linux-image-2.6.28-13-virtual 2.6.28-13.45
After a standard system upgrade you need to reboot your computer to effect the necessary changes.
ATTENTION: Due to an unavoidable ABI change for Ubuntu 8.04 and 8.10, the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-server, linux-powerpc), a standard system upgrade will automatically perform this as well.
Details follow:
Igor Zhbanov discovered that NFS clients were able to create device nodes even when root_squash was enabled. An authenticated remote attacker could create device nodes with open permissions, leading to a loss of privacy or escalation of privileges. Only Ubuntu 8.10 and 9.04 were affected. (CVE-2009-1072)
Dan Carpenter discovered that SELinux did not correctly handle certain network checks when running with compat_net=1. A local attacker could exploit this to bypass network checks. Default Ubuntu installations do not enable SELinux, and only Ubuntu 8.10 and 9.04 were affected. (CVE-2009-1184)
Shaohua Li discovered that memory was not correctly initialized in the AGP subsystem. A local attacker could potentially read kernel memory, leading to a loss of privacy. (CVE-2009-1192)
Benjamin Gilbert discovered that the VMX implementation of KVM did not correctly handle certain registers. This only affected 32bit hosts. Ubuntu 6.06 was not affected. (CVE-2009-1242)
Thomas Pollet discovered that the Amateur Radio X.25 Packet Layer Protocol did not correctly validate certain fields. A remote attacker could exploit this to read kernel memory, leading to a loss of privacy. (CVE-2009-1265)
Trond Myklebust discovered that NFS did not correctly handle certain long filenames. Only Ubuntu 6.06 was affected. (CVE-2009-1336)
Oleg Nesterov discovered that the kernel did not correctly handle CAP_KILL. (CVE-2009-1337)
Daniel Hokka Zakrisson discovered that signal handling was not correctly limited to process namespaces. Only Ubuntu 8.04 was affected. (CVE-2009-1338)
Pavel Emelyanov discovered that network namespace support for IPv6 was not correctly handled. Only Ubuntu 8.10 and 9.04 were affected. (CVE-2009-1360)
Neil Horman discovered that the e1000 network driver did not correctly validate certain fields. (CVE-2009-1385)
Pavan Naregundi discovered that CIFS did not correctly check lengths when handling certain mount requests. (CVE-2009-1439)
Simon Vallet and Frank Filz discovered that execute permissions were not correctly handled by NFSv4. A local user could bypass permissions and run restricted programs, possibly leading to an escalation of privileges. (CVE-2009-1633)
Mikulas Patocka discovered that /proc/iomem was not correctly initialized on Sparc. Ubuntu 6.06 was not affected. (CVE-2009-1914)
Miklos Szeredi discovered that OCFS2 did not correctly handle certain splice operations. Ubuntu 6.06 was not affected. (CVE-2009-1961)
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-54.77.diff.gz
  Size/MD5:  3001537 eba4f5e0c7a98a38dea67bfa3e168240
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-54.77.dsc
  Size/MD5:     2400 4ddbb75d160d27e0385fbabe7f1ee16a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15.orig.tar.gz
  Size/MD5: 57403387 88ab0747cb8c2ceed662e0fd1b27d81d
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-doc-2.6.15_2.6.15-54.77_all.deb
  Size/MD5:  5167494 b57a1f066e6e27335636d97032bac1e4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-kernel-devel_2.6.15-54.77_all.deb
  Size/MD5:    95350 6585056cad015d6ca7e28ab593cd8b69
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-54.77_all.deb
  Size/MD5: 44742940 96f1bf40f8e1197b05d8cc2892f2c145
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:    22354 a8efeb55cc67813d523cce4e9a8540ec
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:    44770 ceb8d616dcdd3e0acd2c5f1bc0957167
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:     2306 13cb4639cc7517e3111efdea783b906e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:    36252 5ef331e5a71c799d054ed67e1af7afb6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:   102298 94937c4a9294258227c971c9c5e05c5b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:    38894 eb294ea73d31f1c2f9fda6618ec63770
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:    49144 b633a70773bbbe8acf959b99056c8117
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:   176712 02c0b79f0fa0b1ebf343781974474a4e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:    36776 8a9d598a72f8199cafd120f3aec583c1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:   142248 3adf2b7652974e829eaeb41d822a5011
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:    51070 25ec529d7f82bfb0ddcd981304434934
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:   140616 bf360bdcf71309b158123ce3070aaaf9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:   286860 041ee91c6050c552bd52930dfb7c9f6b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:    97798 b66af76803a50cf7a3b22c2fbb9f00b4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:  1651646 756c6cea34752f0bf7a1e829db020e57
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-amd64-generic_2.6.15-54.77_amd64.deb
  Size/MD5:   871700 f51a4a973ece89338d4843d27a5ced94
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-amd64-k8_2.6.15-54.77_amd64.deb
  Size/MD5:   872620 cef392fe29c4a2dcfa1ffb9607f990eb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-amd64-server_2.6.15-54.77_amd64.deb
  Size/MD5:   872046 e9a140b82a6800dd7c08d8b744e75e2f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-amd64-xeon_2.6.15-54.77_amd64.deb
  Size/MD5:   872590 46b39ade35d2e36728d913fe84b6f79d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54_2.6.15-54.77_amd64.deb
  Size/MD5:  6925720 a40915984f97b8e817774d8d56155484
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-amd64-generic_2.6.15-54.77_amd64.deb
  Size/MD5: 20816072 98817474a9a662d4c5d79811547b98ef
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-amd64-k8_2.6.15-54.77_amd64.deb
  Size/MD5: 20785638 cbf0cd088aeff7b0b87df905b9e8468f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-amd64-server_2.6.15-54.77_amd64.deb
  Size/MD5: 21630872 f56a80007a836fec66ef9a2a94883d97
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-amd64-xeon_2.6.15-54.77_amd64.deb
  Size/MD5: 19903700 98158564170bf417e3ba7f91263f5f31
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:    15646 3894b718b3d312c48c92d9ac52252e5d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:   240370 a8ee1ef17d8c778484a1b5fdc14777b5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:   202636 2fbb7c2f21624e8c39388ac167f1bca3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:  1048602 97b108097bf19f308240d1413ad38b64
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:  1542980 c57046562d168b6e8ee13a25fea0347c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:   161648 c9463e7a0ebb0c3879f7a6d644751c85
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:     9832 88ec0bfa3382802a777bcbf9dc7d2220
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:    80862 c850080cdc776aabab0c7e0e89cdb13d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:    49172 99f5fcc78a1beea9bbbf9cb455c45707
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:    35168 9a07d29dedcbed5a44079e64e2bfc911
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:    70884 86d8342ace381ebf07b2f4ead760797c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:     6224 55a1df7fa8889b89cd3a009d2d84cbb0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:     9060 9805d4d7b24730a66d881ec8ffccc203
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:    57898 4a0c6ab2237785c56a140bb82818578a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:   123332 cfa831d03acaba7fdcd38cc296245fd7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:   101028 f5be2f6c6c299d7c732b59fbfc2ea586
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:    79250 a59e9df8e087eac06df9fbda8a8a6405
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:  1594790 0bc41203b7830a51a6e1a1b9f981ab15
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:    72306 6acc47f96a766cc043ee2a4f47edd3d3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:    12654 5a615c1146e10d37ef89d0d2ffaf770e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:    33736 850c53ba72802eba8128f9c69786b663
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:   138534 82827eb2785d66387e75873bcbcb84f9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:    38938 bb5ec1051b41c083cdd18225b4f0ac24
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb
  Size/MD5:   278746 1a19131977b00e345ca43f2da7d78f60
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:    18976 cc2753f5656925c3015c39979cb8cff3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:    43460 a322e932de50b99745f263a9c2d07e00
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:   105212 c109dd4fd0061a526e506e6419e71b24
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:     2286 47108cbcb70c3749d2b045c6f8c1a1c7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:    34576 df9c1643a4d064f3db582744ad47a9e0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:    96952 0fa666be29393ff121f0ff64c45495ea
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:    37102 f4f2833e372e12fabc8237f05e45bf6d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:    44078 cdcdb874e1bc26abeec66c66c39dd6e2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:   167754 575f5b4208371c2e5d11fdd1d8856119
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:    33938 8578c3357a6f1ddfddaf863d2ac2cfb4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:   137870 f46efe5131f63f6f6ee7757d1418b81d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:    46894 7dc4dc6732d97dcf4ec8e854f5f563c6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:   132998 a70d2f28ac9f08ef9b505fbe034fa9e2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:   273450 d6d45586cf1dfff150b030e9ef3de755
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:   102260 7216111ca2c37fc6ef3d6757254f8261
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:  1596062 4d81a723f97979546f7a7032411e88ff
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-386_2.6.15-54.77_i386.deb
  Size/MD5:   863226 924f92be148cb1bb13db4f7252fd644c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-686_2.6.15-54.77_i386.deb
  Size/MD5:   858374 ddd82deb53082e6ce4b6791ed14dd44f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-k7_2.6.15-54.77_i386.deb
  Size/MD5:   859558 59451d436d231e187ec193aa4abfe1fc
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-server-bigiron_2.6.15-54.77_i386.deb
  Size/MD5:   867408 e88f0427e3f965f7c8cfd10cf65255a3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-server_2.6.15-54.77_i386.deb
  Size/MD5:   859510 ff4d32a7389bf7ecdb224525699c1868
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54_2.6.15-54.77_i386.deb
  Size/MD5:  6917458 fd0a57262224b5c9c03b392deee6dba2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-386_2.6.15-54.77_i386.deb
  Size/MD5: 21712838 ce53ee29a36dd9cd9228176e6a67d0cf
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-686_2.6.15-54.77_i386.deb
  Size/MD5: 22508152 f8977584a67f926bce6e172b61d483cc
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-k7_2.6.15-54.77_i386.deb
  Size/MD5: 22255354 85be88ae00e9c10d859985cfe320b9ba
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-server-bigiron_2.6.15-54.77_i386.deb
  Size/MD5: 23618958 0dd94a3c4bc391252914ef536a049eaf
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-server_2.6.15-54.77_i386.deb
  Size/MD5: 23173694 36c092afcfd842937423257362deb71d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:    15510 9bfea12610a193ecbf077c7dc10b67a2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:   238530 0d6767483144ccbdfb4d5496dfa1b890
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:   197046 b779aa690688bd0ce620b3feed37c72f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:  1048392 251f698fe32b7aa18b52b8c930d997a4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:  1740818 be462a74a24ef70208e5af89879da1fb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:   160828 bee9438c9a9c524335bbde0b07be1313
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:     9166 1f281ddb8155bd44eca2c0097bd3412e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:    76484 024d47a314d9e6567fb071e2814622d1
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:    53256 456e910d9e3bde1047c24daef0b5658e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:    33054 3b0bc0f0738ca6080dd9446a54b22ac7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:    85630 b46b2de723e39a047552d1bf53422286
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:     6028 efd9e548799433f47e80be328f92e779
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:     8762 da11c1b27b852c13e054d4aec99b9f13
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:    53636 e7c55e0573e7aabc1098bbe9d37c6910
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:   130776 a254b737d82cd35230628f67effd60d3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:    98432 f772e922c5ca1f3ea8249c702e72cc73
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:    77184 1a3d5fed7e2593cd1e324e81e8f73fbc
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:  1768386 bba934fcf1768f4e6616783b67cc0cb6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:    69570 672c7fe6f046dc6ec11486a62622ed26
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:    11758 a86954df8c28e894e6849038aec6dd3e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:    36008 fc0d3c2b5b263bcd9260dcb8a75cf2e3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:   132566 75fad8a0bac352909402ff2b333fc917
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:    38564 48aa028998c1382beeecf660aa5aac3a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb
  Size/MD5:   299114 f11e7eb80349e04b8f23d8a049f76b56
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    23724 2db2adaa57d92b7f48688f95179e15e0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    25950 95c01793a23a24cbff49964e4b8c5585
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    49326 ab284f2d44d7a2bbc5ea52e67f613b23
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    51530 a600f307f0f91779acc5c1980c4c3223
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:     2308 4effd1e0af9c3f48e2243691eb8ff6be
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:     2482 a4633265ec8c02ba24ea472625a3a3ee
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    40196 21e77905b68f5d3872662ab5948dfd94
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    43758 e439eec68bed9e401fec40c0031434d3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   112596 caf6e08a7b71ca1051b5d94c62029fe3
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   120666 feb6891c9b38bbcc0d58026e14e2a0f5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    40850 d1933a4df097dba261b11bbae450cc95
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    45958 17b93bb9695be9a7cc0cb8bdac26e767
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    29032 6ca496a4614fc2f0bf880a9f0fdbcb35
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    29900 538fd9bb6ec6ff9c1cb4c61506a2094e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   211404 5d35841b61601520fa369d152d3bbd42
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   225214 3866f620a880044623bbc963a1b15f8f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    45056 3fd6ac720a4053a1554c515dbdd60d09
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    40220 342eae2faccd8a8e8235ccbe7a118f44
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:     1936 6eb08d519ab2bf1a5f5fac6e0c832e6d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:     2200 a2f7579c4986495691a7b124fc34c7c0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    80680 37cbcb404f7c6d42ddf270cb222d97a0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    86078 ffb8b233eb68841688aa616f1880fcb7
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   111644 8d3233bee5a2d55582bda79b6bd22f1c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   125774 b1d8fd5c48d3d50a25da84576e3b1c2e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    53410 9737ace229facb52faba8819b39aaa4f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    58474 c0dfc0546cd6a326e8e5372286147ebc
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   147772 5add6e71d59aa7b22544c89d236f1264
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   161708 2e4eaeb64a8a149fe0e89a6aa32c4273
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   317494 e1e4733d8591ebe9372fe88ed3f0c816
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   287602 85599af30985f874baa2005e68247c8a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   115854 b64bea5344a06582f592f8de8493fea0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   116514 54a687f3c7d632b17400826c8358eec2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:  1924292 af79708a135129928126925812c5e985
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:  2447446 600b87a4f5376d7ed6685dde273d1ca6
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-powerpc-smp_2.6.15-54.77_powerpc.deb
  Size/MD5:   873400 cdb7cb415d400e8e8e9d69fa6a21549d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-powerpc64-smp_2.6.15-54.77_powerpc.deb
  Size/MD5:   870866 7252b4b7c1a9b0d65e69939157d86e13
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-powerpc_2.6.15-54.77_powerpc.deb
  Size/MD5:   868624 fa84e5dae2ee6f9986de8772a1357e23
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54_2.6.15-54.77_powerpc.deb
  Size/MD5:  6946740 28fc20a94d95b0b8c02aca0708a74101
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-powerpc-smp_2.6.15-54.77_powerpc.deb
  Size/MD5: 22776364 389e45cbdd998fa7dafa1229f5737bcb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-powerpc64-smp_2.6.15-54.77_powerpc.deb
  Size/MD5: 23678834 ea0a1438c2b0a5334b7ac71407cbc868
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-powerpc_2.6.15-54.77_powerpc.deb
  Size/MD5: 22355382 18f2e503843c54824551f54d39b8b468
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    17782 9933c39eaa26b6c5558399d461d6e4aa
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    17380 4f213deee9b7c625c1fd48d88f048c6c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   261268 d73545c9cef2251ad094e9e53f889421
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   282478 b037d7889d3f63d86c3605c945f081dc
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   227640 d6a097d06e05da8ae4676497fe918633
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   248884 ca8a5caa96f92834425d7ee4a48a95e2
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:  1048444 f58af64355ebfa8d71973d7961285aea
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:  1048566 32f48ed1ee827656c9446c79d6802b99
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:  1737706 67f6c275ca396042f8613936eda72c97
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:  1877428 8d0bbebe4eb6e4bf964fb6f440af7789
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   250878 c171495228a2d3f25a5dab6a1d46ffe5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   233632 c6062b42d12fa38bc5fcb59261bfa528
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    13026 e2a2a9c9c0a66e0f66e4971456becb07
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    13526 6393b9447870a049537c64f1da8c0984
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    84832 dafa241b2ba2792acc11ed92ebf58d8a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    52194 9d681e1cde559db52f919d9a75da2987
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    73908 1b9eea0eb286147c629a5eb6a737bf68
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    85844 9d8a5108c045be78f3aa16ec41863d49
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:     6624 c39e697a9b25473e791b7668df4798d5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:     7064 02c208ead4772ebd6dfaa1ee19df56cf
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    60376 b83d6031ce6298fd19869d5d29e3a0c4
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    70392 cbaee4dfd466a12dff0b9098baa8788d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   128550 e4821e65980d609ef08066b2780a485a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   157808 9a1b4e218e785ecef63b0406c5f9c8a5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   108038 b472765900eaa08cc2cc54a2ae26d907
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   126050 75623f4ca292e6d3fc2b6e00211f964b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    87304 2ff71c1735a777692a08170ed726345b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    93306 ee8b741bf1ee4f57a90da0ed2b6da7d8
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:  2013972 dac2efef3ff9d6289b7309d57cb72745
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:  1988102 c8d45fc53efb2b9f324547fd06ae7409
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   104106 14ccbc627fb90ae558e79b3833e5ba6b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   115702 19934a14896949c68acbe6f4b6459b0a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    12738 31ecc1891237ac01baa6d70fa55b2ffa
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    14444 a638ce85cd817ffcd0316b798067af0b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    39948 0fad0a28b3b61dbce21d2ab2d3e385ec
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    41474 4c179c6570402716b5e16076ee359ff9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   149308 d381b35191480574c053f931f5d4b838
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   168034 937d9f0067d9c5b86f547355a759ce3a
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    42272 9adfaeeaeec83a69f60bba08b9f7029e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:    44880 8be844f59b2578d8b0b96df521ed2980
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   320284 ed49feb1ad11dbe9eaebdf8e3b55aa14
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb
  Size/MD5:   324712 00dc7e4c517a8e77dbdbcd472560fd07
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb
  Size/MD5:    50478 90ae6fcda7578bfc42fb227db6ed4a16
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb
  Size/MD5:     2362 81e28a5627bcd9793bdb3d7d66c808e0
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb
  Size/MD5:    40332 bba6454e4e7a730fc19a71e9f177591b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb
  Size/MD5:   110530 ee2bc9880d4119adc01104c26f4c9b45
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb
  Size/MD5:    41186 22e3751924678d62633868c319ec33bb
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb
  Size/MD5:   104238 f5357492d5c611bd51c4724b1b955972
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb
  Size/MD5:     7438 6e66a60e61009df9bc350cde8318fd0e
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb
  Size/MD5:   149008 d39a3d71f7cdaa48f4603f0d40d7183d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb
  Size/MD5:  1711722 024c561786c0bfc1f337cc46a1a99842
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-sparc64-smp_2.6.15-54.77_sparc.deb
  Size/MD5:   772116 b88f78698771d7b662bd8f55da837860
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-sparc64_2.6.15-54.77_sparc.deb
  Size/MD5:   771542 ade51cbe986056b296fc493d071add8f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54_2.6.15-54.77_sparc.deb
  Size/MD5:  6963002 734ea162d7bdae6fa642fbb65fc4aefd
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-sparc64-smp_2.6.15-54.77_sparc.deb
  Size/MD5: 15009480 f11efad62b8121702c97f681aaeff50c
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-sparc64_2.6.15-54.77_sparc.deb
  Size/MD5: 14829506 72058abf59e768b6e7a962a0f1765772
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb
  Size/MD5:     7422 0fa7e99c434b4c2e616b163473d2482d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb
  Size/MD5:   248670 395da4afc2eea6417478e5b9df10eac9
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb
  Size/MD5:   212452 381c41cde8488c4b922e0d13250ac60d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb
  Size/MD5:  1048468 d00527551222987b228c1b3a236b33fa
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb
  Size/MD5:  1481892 c2a73def45b9c272b0f1b16b24072f74
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb
  Size/MD5:    10118 6c152d785d4130d9189dfc5562b2918d
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb
  Size/MD5:    40180 bfdd5a38c85c337948efc354d5b52b1b
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb
  Size/MD5:     9370 a6b288b0cddcba37aa113b6c6a82c1ac
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb
  Size/MD5:    61482 f6d84c317c95ca51e4a3a961edd4afbc
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb
  Size/MD5:   163022 75d6fbd3830d3fa83a4a33087893230f
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb
  Size/MD5:    64010 b2c069e1a9ab296b69db1c9d9347fdb5
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb
  Size/MD5:  1235086 983bf44bbfed30448fc00b43e525a222
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb
  Size/MD5:    59354 ce272f6264ab0b9731c489358ffae596
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb
  Size/MD5:    37406 39fb3eb53208a1810ef284874296c3ac
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb
  Size/MD5:   280076 7716ed5dd3c520a43c3774a4e3633047
Updated packages for Ubuntu 8.04 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24-24.55.diff.gz
  Size/MD5:  4767049 a3e6ddfbd5081bb6e7535fcde2a3f609
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24-24.55.dsc
  Size/MD5:     2219 ddc04a20e187b20a43a5cecc952e4b59
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24.orig.tar.gz
  Size/MD5: 59085601 e4aad2f8c445505cbbfa92864f5941ab
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.24_2.6.24-24.55_all.deb
  Size/MD5:  4928644 067a5db90758e43f49badf44aadc2ae2
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24_2.6.24-24.55_all.deb
  Size/MD5:  8142948 27ced16bc9ee340f7d2e59c4d03d4175
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-kernel-devel_2.6.24-24.55_all.deb
  Size/MD5:    96898 a53b271582fb8cb0f8aa7a3e6ef32d02
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.24_2.6.24-24.55_all.deb
  Size/MD5: 46978434 5338ae19db39ce537ea7f81fbdfc4a62
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:    28590 3b10ec843d4ca2b68122730e1a14b331
http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:   224138 5ef7d9b5cad79f6e5b10f8a004ec5cf4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:    52646 d4bf1babe03ceacbe09131b76a14b9cd
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:    40622 8e880c89feeb75ddcb97eff9a1d2fb3c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:    48658 639f3170e278823641666c3355710ce9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:    86268 b2ae6f9d0f3397ab9d56b5ee2604f176
http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:    36310 1f5d7ef1723c827f6ec1727b3787f3a9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:   648378 1e2bb0cf23d1a130795cd9f745e76fe7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:   209694 0235e8c39f85c8c59e5d8992d2c4d3fa
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:    39192 40b6ff3fb69584a473fd285329e2e2b2
http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:    67952 06997f3f9fd155b9d8fd19ed840a7f46
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:   145266 94a9d3bf11d07fda05ba8d37e488c75e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:   286678 5b1c737aa948d6e03fdc79cea2467968
http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:  2128784 32fc2ee9b3e3e5fb2b1c8a2522acc991
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-generic_2.6.24-24.55_amd64.deb
  Size/MD5:   671194 533f220e2ed87ae41437a2e46d1135bb
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-openvz_2.6.24-24.55_amd64.deb
  Size/MD5:  1251290 0c12f1ec5d33bf9b98a2cf65411f0cf6
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-rt_2.6.24-24.55_amd64.deb
  Size/MD5:  1273382 3dd530222979fbc4a0ec5846be3daa2b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-server_2.6.24-24.55_amd64.deb
  Size/MD5:   671242 608ed557543bc3b12872b8731ac5594c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-xen_2.6.24-24.55_amd64.deb
  Size/MD5:  1082876 c87e898e14f6037d1e4ad8c2c9fbe726
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-24-generic_2.6.24-24.55_amd64.deb
  Size/MD5: 17801664 16b23af9d06baf9c80b4ffc5b2ac8ce0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-24-server_2.6.24-24.55_amd64.deb
  Size/MD5: 17771428 8122d12f5082445f9603d13335b83515
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-24-generic_2.6.24-24.55_amd64.deb
  Size/MD5: 21014464 68b73490ad11f3343768b5c201c70b25
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-24-server_2.6.24-24.55_amd64.deb
  Size/MD5: 21387618 3b1bee21e40c69175cd5d1d45c5bf353
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.24-24.55_amd64.deb
  Size/MD5:   705286 db77b2afae66f80b6692bb8a19cc602e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:   263680 7f27a9bbc9cefe36cf9dc85d16423bc7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:   176350 b51e4026bc049983ebd216f31169a41e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:   253928 a60545ac2ad4d8cdaf08da09e555ad08
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:  1640052 b5d649f457aecfccea9ee1758b546bd9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:   143684 0290beaef1a4ae3e291e20c517b979cb
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:   164328 9124879a405d861d756f6dbeb40485b0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:   115838 6edbfc0f6d64e81778feec9bbe7d0388
http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:    35062 34b4bfd673f5b69d6a66d357d53913e8
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:    64396 8913719a5eb39424e244f3aa3923ad56
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:    69694 0a45f71737115cdcc8a8a7979bc9c01e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:    21592 1e5dfd4b78a18cbe0615bfe4e656241d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:     8618 3353256d9abc6aac3c8904247fad36a8
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:    57178 34272f15a47eaead9a3bb5e8cabc99fe
http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:   102988 16f8a54269e7acfeec29642135518312
http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:  1212082 7bfdf05b2a0e7a3e2a9bd69bfb74929a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:    45470 57609f5c992b83ab16b19cb8bdacff4a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:    12772 ddb48f6ed471562112661169d41c09c3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:   497808 bd328b4bfef64c9afaddaee236abdb91
http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb
  Size/MD5:    74980 db1542ff52ce70a7fa58d678e70d1ab7
http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-24-openvz_2.6.24-24.55_amd64.deb
  Size/MD5: 19242994 1c7114da74f213cc5cdb9599ecf7233d
http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-24-rt_2.6.24-24.55_amd64.deb
  Size/MD5: 17890604 f7c54711409ec7c911b89a9e8d3cef47
http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-24-xen_2.6.24-24.55_amd64.deb
  Size/MD5: 18900390 a6502ae7ee82cf1393310e22903b2763
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:    23682 1c7aab194616a471285a9d250127a835
http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:    26764 92a84719d2c4883b366d6d68d1820120
http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:   218684 eb3d8b92d6c4a48245724997a6121fc2
http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:   220440 40b53586ca28797dc014b8f656cf4725
http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:    51932 80258fa2f467ec10a1ec94ba389a247e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:    52062 d84d679039a1dcb7a7a6e2be9a11bc9a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:    38324 ff2e0a017b7f58e42c276911d2b763ea
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:    39080 50426ae4e5c02d35e95c5351665417cb
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:    45866 27ce55188a7e0726ea19ac778c1b20bf
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:    46012 ec9111a5e17c2b7cf80a8ec9d7eb574e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:    83200 c17e82497048c7e436642aa16a8b4177
http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:    83580 d683701699212dcc121fb6c59096a766
http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:    32396 2476d6800fd166d9923a3b25e7284e37
http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:    32674 15560eb3ad638e98cf61e9ba41f59040
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:   637392 0fecf174e6f568e2c6c7dad168bc3841
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:   655480 3296fe2e55062e3b5b4b39e79e2104c6
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:   209782 13517227a395e3b14e02c55a04d9b4a3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:   213588 e303705801fc9b3fb8f04b49c18f8d20
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:    46558 47c3d466e4f4e2725a11e60e8869d501
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:    47578 3680b979071cb88973c8aa33f94f2037
http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:    62250 79aec11c8be1c769f018f94cbe9c1e42
http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:    63618 5f60fbf8b28c79d969bbda9f457e5761
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:   130296 744b0747406ed2d6b4d57eac25a866ae
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:   136874 923a1fde2cf0625dd1a4de29e9738fac
http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:   278542 56184e755e1b37390051b10d66615d8e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:   277118 b273c46bbceb8d256b04295ea3f6bc5c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:  2008816 96b6e6b4d202c7d4edcd9a4e9257e663
http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:  2086100 0199324ff0fe5d6e7d833a3c07a6ac0a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-386_2.6.24-24.55_i386.deb
  Size/MD5:   652664 06b4ba3927add4c3a8fb5ee484129bd5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-generic_2.6.24-24.55_i386.deb
  Size/MD5:   655538 f1aad1bb26f9fdaea6bee64cdf6e69d7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-openvz_2.6.24-24.55_i386.deb
  Size/MD5:  1239292 17b21b1c71a637a1f3470befdc6e244c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-rt_2.6.24-24.55_i386.deb
  Size/MD5:  1259626 c857ca06ef5630c9b6faad7c13ef1449
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-server_2.6.24-24.55_i386.deb
  Size/MD5:   657340 e5fc27b2ba6419ae6110bfdb147dc50a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-virtual_2.6.24-24.55_i386.deb
  Size/MD5:   557898 1d6abe04efc461e263605280c3d6a327
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-xen_2.6.24-24.55_i386.deb
  Size/MD5:  1058088 1de1a8532504cfab66b9afb58aa7fd64
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-24-386_2.6.24-24.55_i386.deb
  Size/MD5: 18368104 894bae5c45f3313fa6ffde9c5403a050
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-24-generic_2.6.24-24.55_i386.deb
  Size/MD5: 18389358 0f87aba56c1e970dcc7a05c178764c59
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-24-server_2.6.24-24.55_i386.deb
  Size/MD5: 18498588 f5c1063f494bd8000f41db10a4c923a3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-24-virtual_2.6.24-24.55_i386.deb
  Size/MD5:  8686422 ff430f2f608d318cfdc9ee1f085232c0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-24-386_2.6.24-24.55_i386.deb
  Size/MD5: 25497824 3fdb3a0bae1754cc7dcd5fc13e5c92f3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-24-generic_2.6.24-24.55_i386.deb
  Size/MD5: 26304704 fbf86e8b9355cd2a4dc4e964ce93a1e1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-24-server_2.6.24-24.55_i386.deb
  Size/MD5: 27324298 f2411de5448b6b3dc5041ae93e3fbad8
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-24-virtual_2.6.24-24.55_i386.deb
  Size/MD5: 24820580 7c3be9e7dca67713529e3f593c28ca8d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.24-24.55_i386.deb
  Size/MD5:   705292 e7ea84e2f6120b20e2718223efe47e4a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:   258744 758ec24355c4c81cb04be0b337b79d22
http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:   264062 c3f0e5c7f02e751e8db755eb939e493f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:   163194 681a38c27b55f122aff23ddc43358e82
http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:   162950 64cab9f1cece7117949678fd7022be38
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:   236500 02a04c11e39555ded5a1af39a31f2e1b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:   244826 1536f32ebccf86886505f5c111275425
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:  1809006 eaa66dd9cdf3cae2f3387bc50b0aca3f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:  1826238 ef6179911307b224bfbc9442d401168d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:   150794 3dce18851cd0f9da0e49af7df236dac8
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:   142948 69d90acefce82696bb1db4f68bfc70c9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:   155958 15a467bdd1e7bdbf50d61a024502acb4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:   156974 69832b6793dd3c121ae93eada967077d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:   107174 d2138453acdf0e700bdf074e33e99286
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:   108480 fedf19d305e641f2d3c370dced2309e5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:    32962 e7bd906326133b9381e2cb49c8af646b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:    33388 bcad2f4d1eb61a1d7d795e75854ca434
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:    60704 84ae7bb7df1e8102cb7a7a190d963362
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:    61154 66fd1b4c06a054c95fad67893640b621
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:    82652 ce2130dbd82535557b662084e728928a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:    82958 d439c65c130de9fa29027716f8710874
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:    48356 daa2818cfb4b21a7032416c18182b147
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:    48244 6a2211f86f7f8df90c5b8ceb38a4a627
http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:     8190 b40afdf981d8fe354b20d0bc7cc83c3a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:     8440 70afae21dbbd5f5cef34294c8de8e725
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:    51050 5fe6712265c74000a7d92360c4d1ac81
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:    52908 cf6981bb68eb23f899b6a55642238b7b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:    92184 fe7ae21dc89d89b1921f4ed7cbbabf59
http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:    92448 e18bed4505a2ca45dfd67499c87f3b8b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:  1442928 f9784301cbe888b3a7610f69210845c9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:  1426196 fee708e2af1dab92610fb1c3496c95da
http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:    43236 4b344cdc662f35bad896e8c7bc726f21
http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:    42796 91578f1e887bac7983dae7884b357616
http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:    11406 097f3d4965b4fb4b62250309b71ea556
http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:    12016 4c3681d6ac324a27218a5d7f1eb012a4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:   470332 975e3f02a4bdd541e27f7c917bcfcb11
http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:   472254 3d79ecbffb9a08a25f5e818718137079
http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb
  Size/MD5:    70450 aeb3fece9342114f992fec68f5d48f71
http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb
  Size/MD5:    71368 a6bb96b015f25d08f5628aeedd3bcb81
http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-24-openvz_2.6.24-24.55_i386.deb
  Size/MD5: 20243576 c1424fd878abdcd2a7bc29fc88369c9b
http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-24-rt_2.6.24-24.55_i386.deb
  Size/MD5: 18527060 4213eff1e17851fd9a6ba77150b54638
http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-24-xen_2.6.24-24.55_i386.deb
  Size/MD5: 18773284 a33c73287198621afbe02e414e91d696
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-24-lpia_2.6.24-24.55_lpia.deb
  Size/MD5:   636610 4747e9fa2334ce46a6f0700646291dd9
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-24-lpiacompat_2.6.24-24.55_lpia.deb
  Size/MD5:   703234 44e3bcfa9a931471c392192cfb0c54a8
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-24-lpia_2.6.24-24.55_lpia.deb
  Size/MD5: 14504750 5e482a7e08464985b808a6230a00d1b3
http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-24.55_lpia.deb
  Size/MD5:   705278 c7d8b590dbff2f80c38689e174e2723a
http://ports.ubuntu.com/pool/universe/l/linux/linux-image-2.6.24-24-lpiacompat_2.6.24-24.55_lpia.deb
  Size/MD5: 19810228 4d05fa4a2372061c0c1ac2637ee08ff6
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   334050 549350eae9ac212a55977acc795e683f
http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   318864 ab27ac3a958eb09b9d12fafd09a77df8
http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    62716 00b04f957690db8a0ba8a22438f2e496
http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    73002 e8cb037fdde1bdb771482900638bb6d4
http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    41434 88738c9f94ad51860b132ec86417d295
http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    47824 b3c9f8d3e3d792c644dc6dff2da19df8
http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    89458 52a345ac135c1ac50f528412b7d31f75
http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   105682 57846bf90eef89a20cdf99b67e2f6b2a
http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    44804 3f9bc834fa30a5f15a054bc4a1ffcae0
http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    40928 a1c7bfd9166c6dbd96f79c7454d72bb4
http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   704240 118333ea34b764806834b8da0975eb32
http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   770534 f2ff41faa006ee681e1f0fa467626f98
http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   242804 cd1d00ce97f420cc7a7ea0e73b11bc17
http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   245874 bddc2d618001db1be1d3330b921e498a
http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    69130 630b48f7871d88b3c2ec42ba406b56df
http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   132574 c32734e71c98e17a3d3326c2d0caaa03
http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    70240 1f2caeecf72dea50709079d5987714e8
http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    77438 9c53877ef28007ed1185a93ec5cf90f5
http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   146066 8b3b83976cc2eec52b5dbb49568c2b44
http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   165040 7e0732ce30c7d287c6897fd89f0eab03
http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   387144 7681e85a926a3cfd4bd1101bfe802ef0
http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   350038 c70af186448028febde4ce8eb77751f7
http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:  2429338 f466200ef72ff34ab3048e67e2fefa4d
http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:  3471000 339b6ce1c1190471faa546011cbe67a6
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-24-powerpc-smp_2.6.24-24.55_powerpc.deb
  Size/MD5:   650754 d55d970951a1844ed71f6e3c91709989
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-24-powerpc64-smp_2.6.24-24.55_powerpc.deb
  Size/MD5:   654978 1b04d2d2aab7846f7799a90433106d2e
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-24-powerpc_2.6.24-24.55_powerpc.deb
  Size/MD5:   650486 a9a4f052ac25ea294b6d285808c441da
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-24-powerpc-smp_2.6.24-24.55_powerpc.deb
  Size/MD5: 20160752 f0ee78fa89e85b317dc850d8a5cd5f4c
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-24-powerpc64-smp_2.6.24-24.55_powerpc.deb
  Size/MD5: 21366650 f8c2e33729bac5cc66aade8eed5893a9
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-24-powerpc_2.6.24-24.55_powerpc.deb
  Size/MD5: 19924130 c30583206aa8506e4f8316e3519bb038
http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-24.55_powerpc.deb
  Size/MD5:   695442 60d6d8281a73567a3a1859e603604f2d
http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   266766 d734653d249aba57e366ae07a6b1fc93
http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   307642 097f927755577ead97570034ae0f6388
http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   192170 d8d4fde8fe228d72875d66dd761ed7df
http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   201578 5f98ef6e232bfb91d8a91be636a154c9
http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   271794 5072cd3330a816dcaa3a77f3805464e3
http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   305896 4fe491fccc865c3d73ccf92bae2544b5
http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:  1806898 510190e890ad1fc342fafec66b6ab616
http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:  2117694 2af9aa4973ab6554eaf799abcff3e1b9
http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   235192 379bf968241b634089ebbf2a3ba440e0
http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   225202 4066dff0c55796f0af7809947252d479
http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   170102 1a3ccf3058cab72bba610082bd9dd390
http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   199686 447cab0246a933abfac18838eaac032a
http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   117910 9074869c8dad579b52daaafefebd100c
http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   139200 06c2711f162832bcaf4141298024f18e
http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    45366 e9f0bb9ae84949936a872f1a90ad4118
http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    46836 05b95ec8a1a0557f8b82e1b0000e2dcc
http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    51136 34dd7d7fb1c2ed5e3d1c737573fb2cd5
http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    60286 99bbe8d8d2ffb39ba38190798354c608
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    74166 682080eb95c5a3820aacf3a3654e9a77
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    87206 4e21dc9fe1e1899d668fa3e0a5e15e14
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    76004 1ae6a390c94233465c10686bf504e4bc
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    30226 9649e84d3347d6ff643833bb0911f670
http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:     8492 100b04ee69053cb99263a9639d1fe52e
http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    10026 9b7c48978f55d3ab82a253db053175d7
http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    57368 dbba71ebc8d5e9ab03a061cc143d8c6e
http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    68688 9dba3901ed2ccf499412430b8ae02ffe
http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   101246 290026d8946c001bd7e2f9e8d6510a6b
http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   147768 ad3b8e8f8947d09aa69cbd7f9034e440
http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:  1565048 4e7fd21f0fa808514fc1f84e6113e4dd
http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:  1514044 2eb4cb565003a82d51c8cc36db03c6e7
http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    76680 6c5817e16da05b6017c93af9ac31fe2d
http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    85964 45673fac64f8a6d5074a5173bfeb38e0
http://ports.ubuntu.com/pool/main/l/linux/socket-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    12710 25923caf1ed00118907a4e61b5df617f
http://ports.ubuntu.com/pool/main/l/linux/socket-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    14558 22805c8e35fa454f643f9913f2a0083d
http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   449544 ff9ce90996651531510b7880de3d87fd
http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   504018 c28ce7f4984fff73f65845d644d956db
http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:    83508 cc54fd358a4e6f5b812fefc493f53d49
http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb
  Size/MD5:   108720 70ec0fd895b63491bc5b5e895d23e730
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb
  Size/MD5:    59596 e0228d1b8d48dcb9b2eeb5a133fd4fea
http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb
  Size/MD5:    71728 1cde4a7c06765886c874a504349c7295
http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb
  Size/MD5:    42454 dede4ea8cdb116e8865de77c903012a6
http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb
  Size/MD5:    91760 fb38bcd0b2c03e153c25569fd6bf6f7f
http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb
  Size/MD5:   587002 31d43eb6a4b4fba550bd644c5e3dab86
http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb
  Size/MD5:   171008 431c1bde571792a29e2c746ac89f4069
http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb
  Size/MD5:    22354 17062dcda3c2018f97dbc320045cff0e
http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb
  Size/MD5:    46050 111c0d79c0bdad8a685f422383037219
http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb
  Size/MD5:   152862 e2cc622a55df2744b07812def8c89239
http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb
  Size/MD5:  2121270 a2a2e37a9c05525401efaffc7ce199e7
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-24-sparc64-smp_2.6.24-24.55_sparc.deb
  Size/MD5:   562642 a76540180de0ac6e12dac23389ac1b3f
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-24-sparc64_2.6.24-24.55_sparc.deb
  Size/MD5:   560822 72eb5f3fcb523dd8106850417fd0520e
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-24-sparc64-smp_2.6.24-24.55_sparc.deb
  Size/MD5: 14090906 2d868fdedfc320b2239dbf301790d1dc
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-24-sparc64_2.6.24-24.55_sparc.deb
  Size/MD5: 13802896 bf6e9b86cbdede26fd89061b10296551
http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-24.55_sparc.deb
  Size/MD5:   750358 2aa64567f87f3e01794a2c86529da23d
http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb
  Size/MD5:   270052 0ba83932dbed8aeaf6ddd3a29b692a46
http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb
  Size/MD5:   190274 e71570e211349110b3e422c4be949ad2
http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb
  Size/MD5:   262746 5945be1dee0f68cc7c2accaf043bc050
http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb
  Size/MD5:  1385732 1e777b3f2817abf6b080c0716332bbd5
http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb
  Size/MD5:   175218 97800c61086265b7ec2e905295897e5a
http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb
  Size/MD5:   122096 951902334238b51aa9b172b78962db10
http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb
  Size/MD5:    40402 c630c56f90c33e2bd29d18af59670427
http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb
  Size/MD5:    48062 599c33d62648436711413f7d36da2d18
http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb
  Size/MD5:     8700 5d3347aa29bdfac095254b435ed40d98
http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb
  Size/MD5:    60398 53c6a79c562b197f78a7e1fdb4e77e95
http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb
  Size/MD5:   106764 9889da01d9805293d43cab0fd63ffeec
http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb
  Size/MD5:  1001728 2fe7e877334ddd3cf236f6e98f5f46fe
http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb
  Size/MD5:     9512 be22a95339bad90349084fa441b1471f
http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb
  Size/MD5:   391164 43cbe127ea4d0b428ac38c360e235cb3
http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb
  Size/MD5:    75858 d3fd8c3a8134018d37ddc66b7fb0711d
Updated packages for Ubuntu 8.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27-14.35.diff.gz
  Size/MD5:  3181140 f341f37430b19a4815761da90e63e255
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27-14.35.dsc
  Size/MD5:     1491 348bdb8051f6821a99b6e0725c2aca64
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27.orig.tar.gz
  Size/MD5: 63721466 482b04f680ce6676114ccfaaf8f66a55
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.27_2.6.27-14.35_all.deb
  Size/MD5:  3489746 1ff47091f292a7388a12f08f9dc8f8b7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-14_2.6.27-14.35_all.deb
  Size/MD5:  5793886 6b12bcd8a9d7fbb597c13d0aa0d285bf
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.27_2.6.27-14.35_all.deb
  Size/MD5: 52077688 28412f9128132c91c15915a3d5812093
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:    36522 304d150ef4d9a9db9695c2ea3eddf798
http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:   265178 c0cedca8f9af22d7d35a6f5331e64f46
http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:    53460 164d97bf182cdc710089336701669026
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:    43068 27182ab8ec89343ddb1acaadb79d20a8
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:    52322 615253a966a6cfb75cde1ea2e74cdcfb
http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:    89740 8ed1b79d7e290f7bf3cb49f50907e370
http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:    38172 56c5bfbb21825a4fa74292c63532e201
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:   676692 265d0d3fd047797b08261901f3cb50d1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:   158538 b27457d63fe234182a931c857b64d242
http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:    46344 f4e9b955dc853195fd05ecae5f140794
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:   154248 ad469c83e50590ada6c4b399a6d69854
http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:   312772 95e8ea1f4626ae7ced5c93597fbd8af0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:  2602274 23d7c86bd8d4ad26d754b97a428b74d4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-14-generic_2.6.27-14.35_amd64.deb
  Size/MD5:   660580 6c6df3fe5e9f36c47392b8df503fb996
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-14-server_2.6.27-14.35_amd64.deb
  Size/MD5:   660584 05bb6f130a1faac0e47c59a64cb59e41
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-14-generic_2.6.27-14.35_amd64.deb
  Size/MD5: 23065618 fe985c117c3b6faee48830f64cabf971
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-14-server_2.6.27-14.35_amd64.deb
  Size/MD5: 23071172 a9d6617828de879a1ef4a68610f06e43
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-14-virtual_2.6.27-14.35_amd64.deb
  Size/MD5: 10464288 f91fdb8992629a5ae82cbcb2d383b8e7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.27-14.35_amd64.deb
  Size/MD5:   673298 fe94d2d76e3a5dce812d7d8a597637a1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:   434636 6fe6ed3dc5c57e5a876f2c6c6c7fbb88
http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:   186386 338f1bad9040bf0c78ee9397de9398b0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:   275414 4a5d4c3690aedd96e3eee3d922d73728
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:  1809338 6afa319ea3d9f91e4d16629b86afb1b6
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:   151300 cdf306368201a053d740b4d77bf62c02
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:   194010 d7ed2a96bbd6dcfa75c163511c8b4f7c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:   168054 27dbc834cddb14ce830806e769efb0b6
http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:    36432 95637deca9859881af3edf3db8e06ccc
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:    83440 e97ed7ed724ca8c518927601f6b433b9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:    71986 1c4c570c1fe15e5cebad90d8a93cf70f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:    23240 ebaa5d5263395e8517ea82ae3b92ddfc
http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:     9012 f865b88210a4c54d8fdc79a9cfbdf4a0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:    68492 6994b7e19338405c0e127924e67e516d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:   110292 8e81e11a44a41f94fef4dff4e59e3da3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:  1275410 34848383b66939762660048e268e8441
http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:    47594 9181c757204f49f4d0dac390e83f02a4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:    13480 a51476c745872d0858d9b7033a64ea9f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:   393508 9500d323c74c9a330c85183c1686ff49
http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:   200788 c5ed4008f970210bb982f80cbce591e4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb
  Size/MD5:    13620 2fc4b4f188f9218932d0490308507835
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:    33922 f40a1e72d099b64c586a6db641443044
http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:   244642 b720012479a1cbe6ba08d28302584fc9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:    55394 90c1f139ebe83c6d6d8b1a1fc1061297
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:    41218 c1b7874af183c54e95df8d57557aa7c0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:    48654 dfb3c0359053a662017fd9dea0f840ab
http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:    86896 3e594eaa10f4598f2c050daf5ee208e5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:    34058 c5f4fc9d0f61e279e0f6a9b351545b27
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:   675184 eac37d6873c317fec9dbc41af85ce84f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:   158298 fdb6996d620940e986f9e809a1061414
http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:    43598 8d56f44e1e6c01610509b5cdc9ea5f42
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:   145120 47f331154c2773e7861a63965661123a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:   301946 d7980f5869e46243a45b37625ad61afe
http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:  2435224 46b565365b11d793768f04f50a4c248b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-14-generic_2.6.27-14.35_i386.deb
  Size/MD5:   643392 3e61d3633116618454601e745e24a863
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-14-server_2.6.27-14.35_i386.deb
  Size/MD5:   644726 37a677e1e3004e6b42d0958beeb0fda7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-14-generic_2.6.27-14.35_i386.deb
  Size/MD5: 23478050 04856487eac811aebdd2a30416889f40
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-14-server_2.6.27-14.35_i386.deb
  Size/MD5: 23600374 2b9a4093fbdd02dbd054cbe8ca2384f1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-14-virtual_2.6.27-14.35_i386.deb
  Size/MD5: 10108412 0d4c0bd4e94cac0ea3b384b6b1d29cb5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.27-14.35_i386.deb
  Size/MD5:   673308 dc76499e326c2f5c2e10b547241ed770
http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:   432904 836dfe4f7fd217c3d6b4e50ee27ff5ec
http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:   171144 e01935798941dc8722f25c9e499d7dba
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:   263706 ad942f31cb448980c110c5d65b4c5938
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:  1993126 9e48f8f227a345c72ae76263b3acc41e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:   150922 d45e54c03e6524f7409d8ffe6ccbc1fe
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:   183850 26ff7871dda8a29516eb04951e395500
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:   157722 7cefa9c1e1abd9574daa5a2732c8d43b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:    34498 a323c4253a702888a9ee866bafcac9e5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:    78252 3306e0596c6ec6a941906ec5cf1b5896
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:    86172 14f820994a04b74bacc55f908ced747a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:    51176 929ace31f9151a14f646711b57141335
http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:     8794 c6ff3050c0e8d61f69978e3a64f3afc0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:    64308 ab5438618e09f3747c9cabe4d2202d42
http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:   102010 d66cf8423068745b1896a2d37087ea57
http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:  1449250 cc24f0d8b7411f15f0b3704c92c73719
http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:    44514 0763f6eeda9cf0971a5145eeca31a37b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:    12642 4142729eb596aefe6b55a3c91b537aa7
http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:   372528 2ec016366a3c65b130470af25b4f4cd9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:   189698 577f8d2648589a2620fe4917bcd90e4a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb
  Size/MD5:    12992 aaf90b0f25f26915752e0d01ffdf1404
Updated packages for Ubuntu 9.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28-13.45.diff.gz
  Size/MD5:  7052018 c30f6c12f534fb270e77a8db16658c00
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28-13.45.dsc
  Size/MD5:     1988 c31e8f14e5353913483bcbe5134a221a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28.orig.tar.gz
  Size/MD5: 66766084 062c29b626a55f09a65532538a6184d4
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.28_2.6.28-13.45_all.deb
  Size/MD5:  3630660 dff37123aa2a0a01813aaafa113efeaa
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-13_2.6.28-13.45_all.deb
  Size/MD5:  8694158 d568990611704c5022f17a406bba56da
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.28_2.6.28-13.45_all.deb
  Size/MD5: 56896726 2218180442fe2265c4a383718103d24b
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:   234530 8ca4ab91f04156b591af5e036a9d9eaf
http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:    44110 3d35edf87a693b4aec248c4e110db223
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:    43326 8b5f1e9917275cb49fd5cdc5fe7c372c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:    51102 a1b090802ce4589182c26704db51e79a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:    89946 692cdd4f68027d91736aee9507a279a3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:    37992 40f149752511e8e7d4b527bd321f5f61
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:   521610 a346bd312d8eed61e8bb96fb59f3b9b9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:   125632 86429c19731c1bbc4fc7025d4659f4e0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:    58050 dbb7ceb698b6e40a9429b35804416265
http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:   312206 2bd5e6bd4338e51c72d349a40a24afb9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:  3867978 7532ceaadca5ac062476c9a058e87f87
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-13-generic_2.6.28-13.45_amd64.deb
  Size/MD5:   684590 ce636ed44071caf1eb5696a5b4cd3d52
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-13-server_2.6.28-13.45_amd64.deb
  Size/MD5:   684602 67c72e9124b19974c39f55341d293d4f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-13-generic_2.6.28-13.45_amd64.deb
  Size/MD5: 24250596 54189eb7095f154663e12fcbd03e3052
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-13-server_2.6.28-13.45_amd64.deb
  Size/MD5: 24255096 11079badc74f668bfa9299a94eee9500
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-13-virtual_2.6.28-13.45_amd64.deb
  Size/MD5: 10522290 889f00238ab9579a1a3787b6f4093bba
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.28-13.45_amd64.deb
  Size/MD5:   761032 20f696493a51b361c8211cd3a99773a3
http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:   215158 e7434a687dec03b384f88e8e86870b2d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:   189390 cd7116d69deef0ccd449097583b27125
http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:    29396 de5e69d2393ad59f85a530a3a1076f03
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:   274128 a4bb104369c8be8748a38ec66a6649b1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:  1826044 25d1a4452606ab450f214afd2c6da482
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:   163490 edffca1a4f08889ab04638134e70bdfa
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:   194758 84976648caa181490b9c748f7672e20c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:   152946 38f0b1e429efc2993fb2f0346daf98d2
http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:    36490 09b7bf2b970fab395adc80da34772183
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:     5842 6a537fc3a2af29ba6fd981ce8b2b19f0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:    72132 2416b9382cc51b3b1c424d52bbf379b0
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:    22716 d5f4dc6ca66de6c6044e2fcfcf9783c5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:     8878 58927a3e2b4abbb9a3e0e19c969b701a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:    47470 8cd84b96c9d3b1e32b3e7d29042b4a91
http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:    15622 5b3599e51e3513f458430702ba57410a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:  1272842 175bd4440eb113fa0b72b1c3897457c4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:    47218 3bf3faa60421de087af2696985c361eb
http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:    72626 f431e2290ae3347326ff8b3fc5b5bf98
http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:   126946 c82470ee359a4f8d7879367739e73f1d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb
  Size/MD5:    13472 0299bdd96f706adde62bcbf1fe873527
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:   215716 af09e22b5eededba6f06bbce4b6f7f6e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:    46662 cbb33d90c53ae6c5a277c9f4402188e1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:    41344 c369ce39d1595df751bf81a7ca1d4831
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:    47378 092cfe8af282c15f332902a0295fe1b4
http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:    86848 c2b5e966fc9e4476ab1b6c6fde5bb7a5
http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:    33574 e7b69e22af4eb33299e772769f464803
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:   525474 11f2df9f8143a48c6395b3b51fbd964e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:   125494 feafd7e08878356c984098698d832b72
http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:    54864 7bf17f733cf036e0492643870dbc439a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:   300874 8e5766303f17caafeffc6db2d3590487
http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:  3741754 f62502087f0d206a7c43856618b63099
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-13-generic_2.6.28-13.45_i386.deb
  Size/MD5:   668290 36fb94764dc7b473989ab048f6f8d18d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-13-server_2.6.28-13.45_i386.deb
  Size/MD5:   669404 6dcdc4988b80b0d5fad7a49eec4b3f68
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-13-generic_2.6.28-13.45_i386.deb
  Size/MD5: 24584190 6d3e2aed50aed94ac91512384ae202a8
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-13-server_2.6.28-13.45_i386.deb
  Size/MD5: 24662820 2f4ac0738424f2295bff2077238b126b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-13-virtual_2.6.28-13.45_i386.deb
  Size/MD5: 10219490 e088239542d6b5caa4ba16b16c9ca5ce
http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.28-13.45_i386.deb
  Size/MD5:   761048 a2f34260d40ebb215d26ed09a45e4fe1
http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:   218044 3cfad485954208027c844fe40bc0b838
http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:   174812 bf413e3a9b0cb7ab124f411ead7df97d
http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:    30068 22dfd9b4f06187b520b67d4855f7573f
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:   262414 0e23c7445d3582011f9767101e4af06c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:  2007452 f84390b7d8d9f8b32c74823649b247aa
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:   150198 05caa7db9bb38f7a42ec7ab0deb6ce47
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:   184298 45df2dcc24ab9a0ffc27da827f246206
http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:   143542 5f862fc8f33fc1e4fbcabf78a733f1de
http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:    34572 92451114d002c65edb0d89d053a7037e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:     5502 f39f3f824fff9020a7fa80358fdfe7b9
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:    85990 04a9436fc3c061a9feedf8a46b79a534
http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:    47334 7134b0740644c5c266d52dc6d7524d68
http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:     8712 cbd3f0e41be40915f413ac5802a6221e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:    44698 0cd8ea7ec39409e8563ab5c8c9e0248c
http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:    14740 c7287bd485367a228246ef8502f3d175
http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:  1445196 81a9314640917265a536c3894ceed78a
http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:    44092 84aac7e95054a44fcfc589bce5129355
http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:    69138 e79c9c942d7e02b83359cc1fe7fe6e6e
http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:   119512 ca6a4973ba663fe06f57b52c47b3fe5b
http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb
  Size/MD5:    12672 cff86af5ddbc47b6cc5dbf6892f7f3ad
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:   215242 34f3d0cfbebcc281bff8887d58a2fdd1
http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:    46662 b60318e129f56b4f1ace761bfcbfeb8c
http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:    40950 aaa3fffb7bbd0ad7dbe1a49fd48d3cb0
http://ports.ubuntu.com/pool/main/l/linux/fb-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:    47292 4ca4fffc517a758eb5a9dc3dd69eb2c3
http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:    86454 ba73d27d65487eed24ef32dade5dd6f3
http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:    33270 96d878bfefd1667337a7d781624744fe
http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:   523424 3b0daef52c7fbc78f477a82d2885eedb
http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:   125172 ca7244bb0c9ea93bf1793fafc8d93249
http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:    63536 a2ddb239393108fb7888391bdbcc0235
http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:   300334 b0fe7216d15a908a78ef5eee547efef9
http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:  3033028 ae4b9666c230f663aa490e5ef7915d3c
http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.28-13-lpia_2.6.28-13.45_lpia.deb
  Size/MD5:   636848 685ad5fdd4837d0fc7670b40fdc55424
http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.28-13-lpia_2.6.28-13.45_lpia.deb
  Size/MD5: 21714272 d7a1bafe41d1f5aaf8c2b67a9171c5df
http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.28-13.45_lpia.deb
  Size/MD5:   761014 ebaf6b30ac3b8f5eeaa396e980eef83f
http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:   303684 5e037a0ca19df39904654a98a34a1bc6
http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:   157340 00f6f5576c21231b566afa0e2cf8fd61
http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:    24440 86b67b982ba9ca31546e0b2a21f0f864
http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:   259984 8c79116a9aeb8b302834f8e1fc266955
http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:  1925766 1212a0ff61f4eda2f650f309d08be026
http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:   149320 40933fec799a654327e69f3e147f84d5
http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:   184726 9c6154589bfc80b2dbddd2bcb84427de
http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:   143218 050db10728b271bdc222ec1af04581cb
http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:    34468 33f04ac2a7c747cace4c3cca47fc5c33
http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:     5494 d974930a7f9c6808966eb8a90f7b6e09
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:    85642 67d356fdc7853f0e2080da162297ce7a
http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:    47256 d814aa4d377714470bd6acc6a5e310db
http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:     8708 97001eca3bfbeea54af2f8754beb6417
http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:    63068 f7c2bd8e6e913ccebecc87873d9c5ce3
http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:    14688 2bf1158a576fa810d85facf7bfd4b6d2
http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:  1446758 b3a985a1ea798516afd4a7afd356a2e9
http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:    43890 c37408769b4cd3de313f21dd7c1ae220
http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:   154914 2d14ce87eaa2b0f3ab967c818d87648b
http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:   172600 716eff2706e585a3064c44ca8fae9ce9
http://ports.ubuntu.com/pool/main/l/linux/virtio-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb
  Size/MD5:     8158 3cac29e81c3e9d2a3d905761f572e74d
. Local users can exploit this vulnerability to gain elevated privileges. Rather, they will be released in a staggered or "leap-frog" fashion. Updates for arm and mips will be released as they become available. (CVE-2009-1184)
The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1 does not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies the exit_signal field and then uses an exec system call to launch a setuid application. (CVE-2009-1337)
The (1) agp_generic_alloc_page and (2) agp_generic_alloc_pages functions in drivers/char/agp/generic.c in the agp subsystem in the Linux kernel before 2.6.30-rc3 do not zero out pages that may later be available to a user-space process, which allows local users to obtain sensitive information by reading these pages. (CVE-2009-1192)
The ABI in the Linux kernel 2.6.28 and earlier on s390, powerpc, sparc64, and mips 64-bit platforms requires that a 32-bit argument in a 64-bit register was properly sign extended when sent from a user-mode application, but cannot verify this, which allows local users to cause a denial of service (crash) or possibly gain privileges via a crafted system call. The verification of md5 checksums and GPG signatures is performed automatically for you. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFKORHLmqjQ0CJFipgRAnzRAJ9w1CGojCsYdG001OcNmQuVonRkrwCeNMpH bzIigZKDE4V8120vojufik8= =cJ+u -----END PGP SIGNATURE----- . ESX 3.0.3 Update 1, ESX 3.5 Update 5, and VirtualCenter 2.5 Update 6). Refer to section "End of Product Availability FAQs" at http://www.vmware.com/support/policies/lifecycle/vi/faq.html for details.
Extended support for ESX 3.0.3 ends on 2011-12-10. Users should plan to upgrade to at least ESX 3.5 and preferably to the newest release available.
ESX 3.5
http://download3.vmware.com/software/vi/ESX350-201006401-SG.zip md5sum: b89fb8a51c4a896bc0bf297b57645d1d http://kb.vmware.com/kb/1022899
- References
 
CVE numbers http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5029 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5300 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1337 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1385 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1895 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2848 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3002 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3547 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2698 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2692
6
Show details on source website{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200906-0598",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "linux",
        "version": "2.6.29.rc1"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "linux",
        "version": "2.6.29"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "linux",
        "version": "2.6.29.rc2"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "linux",
        "version": "2.6.30"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.26.4"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.20.18"
      },
      {
        "model": "e1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": "7.4.27"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.25.11"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.27"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.22_rc1"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.25.2"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.25.8"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.22.22"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.22.20"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.20.16"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.24.6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.22.10"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.25"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.23.8"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.20.19"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.23.13"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.23.16"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.23"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.25.1"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.22"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.25.3"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.4.36.5"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.4.36.2"
      },
      {
        "model": "e1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": "7.0.33"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.2.27"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.18"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.22.12"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.23.10"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.24_rc4"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.4.36.3"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.22.9"
      },
      {
        "model": "e1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": "5.2.30.1"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.26.3"
      },
      {
        "model": "e1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": "7.0.41"
      },
      {
        "model": "e1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": "6.3.9"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.23.12"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6"
      },
      {
        "model": "e1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": "5.4.11"
      },
      {
        "model": "e1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": "7.1.9"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.29.rc2-git1"
      },
      {
        "model": "e1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": "6.2.15"
      },
      {
        "model": "kernel",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.28"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.22.18"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.25.13"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.23.9"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.25.5"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.22.1"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.26.1"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.19.6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.25.6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.29.3"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.26"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.19.5"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.25.12"
      },
      {
        "model": "e1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": "5.5.4"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.21.6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.4.36.1"
      },
      {
        "model": "e1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": "5.2.52"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.4.36"
      },
      {
        "model": "e1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": "5.3.19"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.26.5"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.4.36.6"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.24.1"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.19.7"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.22.2"
      },
      {
        "model": "e1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": "6.0.60"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.19.4"
      },
      {
        "model": "e1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": "7.2.7"
      },
      {
        "model": "e1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": "7.3.15"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.24"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.22.19"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.25.9"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.25.16"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.23.15"
      },
      {
        "model": "e1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": "7.3.20"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.22.13"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.24.4"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.25.10"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.25.17"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.22.21"
      },
      {
        "model": "kernel",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.30"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.23_rc1"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.4.36.4"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.20.21"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.22.11"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.24_rc5"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.25.4"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.20.17"
      },
      {
        "model": "e1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": "6.0.54"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.23.17"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.24_rc1"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.22.17"
      },
      {
        "model": "e1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": "6.1.16"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.25.15"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.26.2"
      },
      {
        "model": "e1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": "5.7.6"
      },
      {
        "model": "e1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": "7.2.9"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.23.11"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.21.5"
      },
      {
        "model": "e1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": "5.6.10.1"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.22.8"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.22_rc7"
      },
      {
        "model": "e1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": "5.2.22"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.22.14"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.25.14"
      },
      {
        "model": "e1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": "5.6.10"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.22.15"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.24.5"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.25.7"
      },
      {
        "model": "e1000",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "intel",
        "version": "7.4.35"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.20.20"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.21.7"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.24.7"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.24.2"
      },
      {
        "model": "kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "linux",
        "version": "2.6.24.3"
      },
      {
        "model": "kernel",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "linux",
        "version": "2.6.30-rc8"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "3 (x86)"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "3 (x86-64)"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "3.0"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "3.0 (x86-64)"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "4.0"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "4.0 (x86-64)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "3 (as)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "3 (es)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "3 (ws)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "4 (as)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "4 (es)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "4 (ws)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "4.8 (as)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "4.8 (es)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "5"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "5 (server)"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "3.0"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "4.0"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "5.0 (client)"
      },
      {
        "model": "enterprise linux eus",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "5.2.z (server)"
      },
      {
        "model": "enterprise linux eus",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "5.3.z (server)"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001876"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200906-053"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1385"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:linux:linux_kernel",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:misc:miraclelinux_asianux_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:redhat:enterprise_linux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:redhat:enterprise_linux_desktop",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:redhat:enterprise_linux_eus",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001876"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Neil Horman",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200906-053"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2009-1385",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2009-1385",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-38831",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2009-1385",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2009-1385",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200906-053",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "VULHUB",
            "id": "VHN-38831",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2009-1385",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-38831"
      },
      {
        "db": "VULMON",
        "id": "CVE-2009-1385"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001876"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200906-053"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1385"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size. (DoS) There is a vulnerability that becomes a condition.Denial of service due to crafted frame size (DoS) There is a possibility of being put into a state. The NFSv4 implementation is one of the distributed file system protocols. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- -----------------------------------------------------------------------\n                   VMware Security Advisory\n\nAdvisory ID:       VMSA-2009-0016\nSynopsis:          VMware vCenter and ESX update release and vMA patch\n                   release address multiple security issue in third\n                   party components\nIssue date:        2009-11-20\nUpdated on:        2009-11-20 (initial release of advisory)\nCVE numbers:       --- JRE ---\n                   CVE-2009-1093 CVE-2009-1094 CVE-2009-1095\n                   CVE-2009-1096 CVE-2009-1097 CVE-2009-1098\n                   CVE-2009-1099 CVE-2009-1100 CVE-2009-1101\n                   CVE-2009-1102 CVE-2009-1103 CVE-2009-1104\n                   CVE-2009-1105 CVE-2009-1106 CVE-2009-1107\n                   CVE-2009-2625 CVE-2009-2670 CVE-2009-2671\n                   CVE-2009-2672 CVE-2009-2673 CVE-2009-2675\n                   CVE-2009-2676 CVE-2009-2716 CVE-2009-2718\n                   CVE-2009-2719 CVE-2009-2720 CVE-2009-2721\n                   CVE-2009-2722 CVE-2009-2723 CVE-2009-2724\n                   --- Tomcat ---\n                   CVE-2008-5515 CVE-2009-0033 CVE-2009-0580\n                   CVE-2009-0781 CVE-2009-0783 CVE-2008-1232\n                   CVE-2008-1947 CVE-2008-2370 CVE-2007-5333\n                   CVE-2007-5342 CVE-2007-5461 CVE-2007-6286\n                   CVE-2008-0002\n                   --- ntp ---\n                   CVE-2009-1252 CVE-2009-0159\n                   --- kernel ---\n                   CVE-2008-3528 CVE-2008-5700 CVE-2009-0028\n                   CVE-2009-0269 CVE-2009-0322 CVE-2009-0675\n                   CVE-2009-0676 CVE-2009-0778 CVE-2008-4307\n                   CVE-2009-0834 CVE-2009-1337 CVE-2009-0787\n                   CVE-2009-1336 CVE-2009-1439 CVE-2009-1633\n                   CVE-2009-1072 CVE-2009-1630 CVE-2009-1192\n                   CVE-2007-5966 CVE-2009-1385 CVE-2009-1388\n                   CVE-2009-1389 CVE-2009-1895 CVE-2009-2406\n                   CVE-2009-2407 CVE-2009-2692 CVE-2009-2698\n                   CVE-2009-0745 CVE-2009-0746 CVE-2009-0747\n                   CVE-2009-0748 CVE-2009-2847 CVE-2009-2848\n                   --- python ---\n                   CVE-2007-2052 CVE-2007-4965 CVE-2008-1721\n                   CVE-2008-1887 CVE-2008-2315 CVE-2008-3142\n                   CVE-2008-3143 CVE-2008-3144 CVE-2008-4864\n                   CVE-2008-5031\n                   --- bind ---\n                   CVE-2009-0696\n                   --- libxml and libxml2 ---\n                   CVE-2009-2414 CVE-2009-2416\n                   --- curl --\n                   CVE-2009-2417\n                   --- gnutil ---\n                   CVE-2007-2052\n- -----------------------------------------------------------------------\n\n1. Summary\n\n   Updated Java JRE packages and Tomcat packages address several security\n   issues. Updates for the ESX Service Console and vMA include kernel,\n   ntp, Python, bind libxml, libxml2, curl and gnutil packages. ntp is\n   also updated for ESXi userworlds. \n\n2. Relevant releases\n\n   vCenter Server 4.0 before Update 1\n\n   ESXi 4.0 without patch ESXi400-200911201-UG\n\n   ESX 4.0 without patches ESX400-200911201-UG, ESX400-200911223-UG,\n                           ESX400-200911232-SG, ESX400-200911233-SG,\n                           ESX400-200911234-SG, ESX400-200911235-SG,\n                           ESX400-200911237-SG, ESX400-200911238-SG\n\n   vMA 4.0 before patch 02\n\n3. Problem Description\n\n a. JRE Security Update\n\n    JRE update to version 1.5.0_20, which addresses multiple security\n    issues that existed in earlier releases of JRE. \n\n    The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n    assigned the following names to the security issues fixed in\n    JRE 1.5.0_18: CVE-2009-1093, CVE-2009-1094, CVE-2009-1095,\n    CVE-2009-1096, CVE-2009-1097, CVE-2009-1098, CVE-2009-1099,\n    CVE-2009-1100, CVE-2009-1101, CVE-2009-1102, CVE-2009-1103,\n    CVE-2009-1104, CVE-2009-1105, CVE-2009-1106, and CVE-2009-1107. \n\n    The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n    assigned the following names to the security issues fixed in\n    JRE 1.5.0_20: CVE-2009-2625, CVE-2009-2670, CVE-2009-2671,\n    CVE-2009-2672, CVE-2009-2673, CVE-2009-2675, CVE-2009-2676,\n    CVE-2009-2716, CVE-2009-2718, CVE-2009-2719, CVE-2009-2720,\n    CVE-2009-2721, CVE-2009-2722, CVE-2009-2723, CVE-2009-2724. \n\n    The following table lists what action remediates the vulnerability\n    (column 4) if a solution is available. \n\n    VMware         Product   Running  Replace with/\n    Product        Version   on       Apply Patch\n    =============  ========  =======  =================\n    vCenter        4.0       Windows  Update 1\n    VirtualCenter  2.5       Windows  affected, patch pending\n    VirtualCenter  2.0.2     Windows  affected, patch pending\n\n    Workstation    any       any      not affected\n\n    Player         any       any      not affected\n\n    Server         2.0       any      affected, patch pending\n    Server         1.0       any      not affected\n\n    ACE            any       any      not affected\n\n    Fusion         any       any      not affected\n\n    ESXi           any       ESXi     not affected\n\n    ESX            4.0       ESX      ESX400-200911223-UG\n    ESX            3.5       ESX      affected, patch pending\n    ESX            3.0.3     ESX      affected, patch pending\n    ESX            2.5.5     ESX      not affected\n\n    vMA            4.0       RHEL5    Patch 2 *\n\n  * vMA JRE is updated to version JRE 1.5.0_21\n\n    Notes: These vulnerabilities can be exploited remotely only if the\n           attacker has access to the Service Console network. \n\n           Security best practices provided by VMware recommend that the\n           Service Console be isolated from the VM network. Please see\n           http://www.vmware.com/resources/techresources/726 for more\n           information on VMware security best practices. \n\n           The currently installed version of JRE depends on your patch\n           deployment history. \n\n\n b. Update Apache Tomcat version to 6.0.20\n\n   Update for VirtualCenter and ESX patch update the Tomcat package to\n   version 6.0.20 which addresses multiple security issues that existed\n   in the previous version of Apache Tomcat. \n\n   The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n   assigned the following names to the security issues fixed in\n   Apache Tomcat 6.0.20: CVE-2008-5515, CVE-2009-0033, CVE-2009-0580,\n   CVE-2009-0781, CVE-2009-0783. \n\n   The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n   assigned the following names to the security issues fixed in\n   Apache Tomcat 6.0.18:  CVE-2008-1232, CVE-2008-1947, CVE-2008-2370. \n\n   The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n   assigned the following names to the security issues fixed in\n   Apache Tomcat 6.0.16:  CVE-2007-5333, CVE-2007-5342, CVE-2007-5461,\n   CVE-2007-6286, CVE-2008-0002. \n\n   The following table lists what action remediates the vulnerability\n   (column 4) if a solution is available. \n\n   VMware        Product   Running  Replace with/\n   Product       Version   on       Apply Patch\n   ========      ========  =======  =======================\n   vCenter       4.0       Windows  Update 1\n   VirtualCenter 2.5       Windows  affected, patch pending\n   VirtualCenter 2.0.2     Windows  affected, patch pending\n\n   Workstation   any       any      not affected\n\n   Player        any       any      not affected\n\n   ACE           any       Windows  not affected\n\n   Server        2.x       any      affected, patch pending\n   Server        1.x       any      not affected\n\n   Fusion        any       Mac OS/X not affected\n\n   ESXi          any       ESXi     not affected\n\n   ESX           4.0       ESX      ESX400-200911223-UG\n   ESX           3.5       ESX      affected, patch pending\n   ESX           3.0.3     ESX      affected, patch pending\n   ESX           2.5.5     ESX      not affected\n\n   vMA           4.0       RHEL5    not affected\n\n    Notes: These vulnerabilities can be exploited remotely only if the\n           attacker has access to the Service Console network. \n\n           Security best practices provided by VMware recommend that the\n           Service Console be isolated from the VM network. Please see\n           http://www.vmware.com/resources/techresources/726 for more\n           information on VMware security best practices. \n\n           The currently installed version of Tomcat depends on\n           your patch deployment history. \n\n c. Third party library update for ntp. \n\n   The Network Time Protocol (NTP) is used to synchronize a computer\u0027s\n   time with a referenced time source. \n\n   ESXi 3.5 and ESXi 4.0 have a ntp client that is affected by the\n   following security issue. Note that the same security issue is\n   present in the ESX Service Console as described in section d. of\n   this advisory. \n\n   A buffer overflow flaw was discovered in the ntpd daemon\u0027s NTPv4\n   authentication code. If ntpd was configured to use public key\n   cryptography for NTP packet authentication, a remote attacker could\n   use this flaw to send a specially-crafted request packet that could\n   crash ntpd or, potentially, execute arbitrary code with the\n   privileges of the \"ntp\" user. \n\n   The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n   has assigned the name CVE-2009-1252 to this issue. \n\n   The NTP security issue identified by CVE-2009-0159 is not relevant\n   for ESXi 3.5 and ESXi 4.0. \n\n   The following table lists what action remediates the vulnerability\n   in this component (column 4) if a solution is available. \n\n    VMware         Product   Running  Replace with/\n    Product        Version   on       Apply Patch\n    =============  ========  =======  =================\n    vCenter        any       Windows  not affected\n\n    hosted *       any       any      not affected\n\n    ESXi           4.0       ESXi     ESXi400-200911201-UG\n    ESXi           3.5       ESXi     affected, patch pending\n\n    ESX            4.0       ESX      not affected\n    ESX            3.5       ESX      not affected\n    ESX            3.0.3     ESX      not affected\n    ESX            2.5.5     ESX      not affected\n\n    vMA            4.0       RHEL5    not affected\n\n  * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n d. Service Console update for ntp\n\n   Service Console package ntp updated to version ntp-4.2.2pl-9.el5_3.2\n\n   The Network Time Protocol (NTP) is used to synchronize a computer\u0027s\n   time with a referenced time source. \n\n   The Service Console present in ESX is affected by the following\n   security issues. \n\n   A buffer overflow flaw was discovered in the ntpd daemon\u0027s NTPv4\n   authentication code. If ntpd was configured to use public key\n   cryptography for NTP packet authentication, a remote attacker could\n   use this flaw to send a specially-crafted request packet that could\n   crash ntpd or, potentially, execute arbitrary code with the\n   privileges of the \"ntp\" user. \n\n   NTP authentication is not enabled by default on the Service Console. \n\n   The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n   has assigned the name CVE-2009-1252 to this issue. \n\n   A buffer overflow flaw was found in the ntpq diagnostic command. A\n   malicious, remote server could send a specially-crafted reply to an\n   ntpq request that could crash ntpq or, potentially, execute\n   arbitrary code with the privileges of the user running the ntpq\n   command. \n\n   The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n   has assigned the name CVE-2009-0159 to this issue. \n\n   The following table lists what action remediates the vulnerability\n   in the Service Console (column 4) if a solution is available. \n\n    VMware         Product   Running  Replace with/\n    Product        Version   on       Apply Patch\n    =============  ========  =======  =================\n    vCenter        any       Windows  not affected\n\n    hosted *       any       any      not affected\n\n    ESXi           any       ESXi     not affected\n\n    ESX            4.0       ESX      ESX400-200911238-SG\n    ESX            3.5       ESX      affected, patch pending **\n    ESX            3.0.3     ESX      affected, patch pending **\n    ESX            2.5.5     ESX      affected, patch pending **\n\n    vMA            4.0       RHEL5    Patch 2\n\n  * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n  ** The service consoles of ESX 2.5.5, ESX 3.0.3 and ESX 3.5 are not\naffected\n     by CVE-2009-1252. The security issue identified by CVE-2009-0159 has a\n     low impact on the service console of ESX 2.5.5, ESX 3.0.3 and ESX 3.5. \n\n e. Updated Service Console package kernel\n\n    Updated Service Console package kernel addresses the security\n    issues below. \n\n    The Common Vulnerabilities and Exposures project (cve.mitre.org)\n    has assigned the names CVE-2008-3528, CVE-2008-5700, CVE-2009-0028,\n    CVE-2009-0269, CVE-2009-0322, CVE-2009-0675, CVE-2009-0676,\n    CVE-2009-0778 to the security issues fixed in kernel\n    2.6.18-128.1.6. \n\n    The Common Vulnerabilities and Exposures project (cve.mitre.org)\n    has assigned the names CVE-2008-4307, CVE-2009-0834, CVE-2009-1337,\n    CVE-2009-0787, CVE-2009-1336 to the security issues fixed in\n    kernel 2.6.18-128.1.10. \n\n    The Common Vulnerabilities and Exposures project (cve.mitre.org)\n    has assigned the names CVE-2009-1439, CVE-2009-1633, CVE-2009-1072,\n    CVE-2009-1630, CVE-2009-1192 to the security issues fixed in\n    kernel 2.6.18-128.1.14. \n\n    The Common Vulnerabilities and Exposures project (cve.mitre.org)\n    has assigned the names CVE-2007-5966, CVE-2009-1385, CVE-2009-1388,\n    CVE-2009-1389, CVE-2009-1895, CVE-2009-2406, CVE-2009-2407 to the\n    security issues fixed in kernel 2.6.18-128.4.1. \n\n    The Common Vulnerabilities and Exposures project (cve.mitre.org)\n    has assigned the names CVE-2009-2692, CVE-2009-2698 to the\n    security issues fixed in kernel 2.6.18-128.7.1. \n\n    The Common Vulnerabilities and Exposures project (cve.mitre.org)\n    has assigned the names CVE-2009-0745, CVE-2009-0746, CVE-2009-0747,\n    CVE-2009-0748, CVE-2009-2847, CVE-2009-2848 to the security issues\n    fixed in kernel 2.6.18-164. \n\n    The following table lists what action remediates the vulnerability\n    (column 4) if a solution is available. \n\n    VMware         Product   Running  Replace with/\n    Product        Version   on       Apply Patch\n    =============  ========  =======  =================\n    vCenter        any       Windows  not applicable\n\n    hosted *       any       any      not applicable\n\n    ESXi           any       ESXi     not applicable\n\n    ESX            4.0       ESX      ESX400-200911201-UG\n    ESX            3.5       ESX      not applicable\n    ESX            3.0.3     ESX      not applicable\n    ESX            2.5.5     ESX      not applicable\n\n    vMA            4.0       RHEL5    Patch 2 **\n\n  * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n  ** vMA is updated to kernel version 2.6.18-164. \n\n f. Updated Service Console package python\n\n    Service Console package Python update to version 2.4.3-24.el5. \n\n    When the assert() system call was disabled, an input sanitization\n    flaw was revealed in the Python string object implementation that\n    led to a buffer overflow. The missing check for negative size values\n    meant the Python memory allocator could allocate less memory than\n    expected. This could result in arbitrary code execution with the\n    Python interpreter\u0027s privileges. \n\n    Multiple buffer and integer overflow flaws were found in the Python\n    Unicode string processing and in the Python Unicode and string\n    object implementations. An attacker could use these flaws to cause\n    a denial of service. \n\n    Multiple integer overflow flaws were found in the Python imageop\n    module. If a Python application used the imageop module to\n    process untrusted images, it could cause the application to\n    disclose sensitive information, crash or, potentially, execute\n    arbitrary code with the Python interpreter\u0027s privileges. \n\n    Multiple integer underflow and overflow flaws were found in the\n    Python snprintf() wrapper implementation. An attacker could use\n    these flaws to cause a denial of service (memory corruption). \n\n    Multiple integer overflow flaws were found in various Python\n    modules. An attacker could use these flaws to cause a denial of\n    service. \n\n    An integer signedness error, leading to a buffer overflow, was\n    found in the Python zlib extension module. If a Python application\n    requested the negative byte count be flushed for a decompression\n    stream, it could cause the application to crash or, potentially,\n    execute arbitrary code with the Python interpreter\u0027s privileges. \n\n    A flaw was discovered in the strxfrm() function of the Python\n    locale module. Strings generated by this function were not properly\n    NULL-terminated, which could possibly cause disclosure of data\n    stored in the memory of a Python application using this function. \n\n    The Common Vulnerabilities and Exposures project (cve.mitre.org)\n    has assigned the names CVE-2007-2052 CVE-2007-4965 CVE-2008-1721\n    CVE-2008-1887 CVE-2008-2315 CVE-2008-3142 CVE-2008-3143\n    CVE-2008-3144 CVE-2008-4864 CVE-2008-5031 to these issues. \n\n    The following table lists what action remediates the vulnerability\n    (column 4) if a solution is available. \n\n    VMware         Product   Running  Replace with/\n    Product        Version   on       Apply Patch\n    =============  ========  =======  =================\n    vCenter        any       Windows  not applicable\n\n    hosted *       any       any      not applicable\n\n    ESXi           any       ESXi     not applicable\n\n    ESX            4.0       ESX      ESX400-200911235-SG\n    ESX            3.5       ESX      affected, patch pending\n    ESX            3.0.3     ESX      affected, patch pending\n    ESX            2.5.5     ESX      affected, patch pending\n\n    vMA            4.0       RHEL5    Patch 2\n\n  * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n g. Updated Service Console package bind\n\n    Service Console package bind updated to version 9.3.6-4.P1.el5\n\n    The Berkeley Internet Name Domain (BIND) is an implementation of the\n    Domain Name System (DNS) protocols. BIND includes a DNS server\n    (named); a resolver library (routines for applications to use when\n    interfacing with DNS); and tools for verifying that the DNS server\n    is operating correctly. \n\n    A flaw was found in the way BIND handles dynamic update message\n    packets containing the \"ANY\" record type. A remote attacker could\n    use this flaw to send a specially-crafted dynamic update packet\n    that could cause named to exit with an assertion failure. \n\n    The Common Vulnerabilities and Exposures project (cve.mitre.org)\n    has assigned the name CVE-2009-0696 to this issue. \n\n    The following table lists what action remediates the vulnerability\n    (column 4) if a solution is available. \n\n    VMware         Product   Running  Replace with/\n    Product        Version   on       Apply Patch\n    =============  ========  =======  =================\n    vCenter        any       Windows  not applicable\n\n    hosted *       any       any      not applicable\n\n    ESXi           any       ESXi     not applicable\n\n    ESX            4.0       ESX      ESX400-200911237-SG\n    ESX            3.5       ESX      affected, patch pending\n    ESX            3.0.3     ESX      affected, patch pending\n    ESX            2.5.5     ESX      affected, patch pending\n\n    vMA            4.0       RHEL5    Patch 2\n\n  * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n h. Updated Service Console package libxml2\n\n    Service Console package libxml2 updated to version 2.6.26-2.1.2.8. \n\n    libxml is a library for parsing and manipulating XML files. A\n    Document Type Definition (DTD) defines the legal syntax (and also\n    which elements can be used) for certain types of files, such as XML\n    files. \n\n    A stack overflow flaw was found in the way libxml processes the\n    root XML document element definition in a DTD. A remote attacker\n    could provide a specially-crafted XML file, which once opened by a\n    local, unsuspecting user, would lead to denial of service. \n\n    Multiple use-after-free flaws were found in the way libxml parses\n    the Notation and Enumeration attribute types. A remote attacker\n    could provide a specially-crafted XML file, which once opened by a\n    local, unsuspecting user, would lead to denial of service. \n\n    The Common Vulnerabilities and Exposures project (cve.mitre.org)\n    has assigned the names CVE-2009-2414 and CVE-2009-2416 to these\n    issues. \n\n    The following table lists what action remediates the vulnerability\n    (column 4) if a solution is available. \n\n    VMware         Product   Running  Replace with/\n    Product        Version   on       Apply Patch\n    =============  ========  =======  =================\n    vCenter        any       Windows  not applicable\n\n    hosted *       any       any      not applicable\n\n    ESXi           any       ESXi     not applicable\n\n    ESX            4.0       ESX      ESX400-200911234-SG\n    ESX            3.5       ESX      affected, patch pending\n    ESX            3.0.3     ESX      affected, patch pending\n    ESX            2.5.5     ESX      affected, patch pending\n\n    vMA            4.0       RHEL5    Patch 2\n\n  * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n i. Updated Service Console package curl\n\n    Service Console package curl updated to version 7.15.5-2.1.el5_3.5\n\n    A cURL is affected by the previously published \"null prefix attack\",\n    caused by incorrect handling of NULL characters in X.509\n    certificates. If an attacker is able to get a carefully-crafted\n    certificate signed by a trusted Certificate Authority, the attacker\n    could use the certificate during a man-in-the-middle attack and\n    potentially confuse cURL into accepting it by mistake. \n\n    The Common Vulnerabilities and Exposures project (cve.mitre.org)\n    has assigned the name CVE-2009-2417 to this issue\n\n    The following table lists what action remediates the vulnerability\n    (column 4) if a solution is available. \n\n    VMware         Product   Running  Replace with/\n    Product        Version   on       Apply Patch\n    =============  ========  =======  =================\n    vCenter        any       Windows  not applicable\n\n    hosted *       any       any      not applicable\n\n    ESXi           any       ESXi     not applicable\n\n    ESX            4.0       ESX      ESX400-200911232-SG\n    ESX            3.5       ESX      not affected\n    ESX            3.0.3     ESX      not affected\n    ESX            2.5.5     ESX      not affected\n\n    vMA            4.0       RHEL5    Patch 2\n\n  * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n j. Updated Service Console package gnutls\n\n    Service Console package gnutil updated to version 1.4.1-3.el5_3.5\n\n    A flaw was discovered in the way GnuTLS handles NULL characters in\n    certain fields of X.509 certificates. If an attacker is able to get\n    a carefully-crafted certificate signed by a Certificate Authority\n    trusted by an application using GnuTLS, the attacker could use the\n    certificate during a man-in-the-middle attack and potentially\n    confuse the application into accepting it by mistake. \n\n    The Common Vulnerabilities and Exposures project (cve.mitre.org)\n    has assigned the name CVE-2009-2730 to this issue\n\n    The following table lists what action remediates the vulnerability\n    (column 4) if a solution is available. \n\n    VMware         Product   Running  Replace with/\n    Product        Version   on       Apply Patch\n    =============  ========  =======  =================\n    vCenter        any       Windows  not applicable\n\n    hosted *       any       any      not applicable\n\n    ESXi           any       ESXi     not applicable\n\n    ESX            4.0       ESX      ESX400-200911233-SG\n    ESX            3.5       ESX      not affected\n    ESX            3.0.3     ESX      not affected\n    ESX            2.5.5     ESX      not affected\n\n    vMA            4.0       RHEL5    Patch 2\n\n  * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n4. Solution\n\n   Please review the patch/release notes for your product and version\n   and verify the md5sum of your downloaded file. \n\n\n   VMware vCenter Server 4 Update 1\n   --------------------------------\n   Version       4.0 Update 1\n   Build Number  208156\n   Release Date  2009/11/19\n   Type          Product Binaries\n   http://downloads.vmware.com/download/download.do?downloadGroup=VC40U1\n\n   VMware vCenter Server 4 and modules\n   File size: 1.8 GB\n   File type: .iso\n   MD5SUM: 057d55b32eb27fe5f3e01bc8d3df3bc5\n   SHA1SUM: c90134418c2e4d3d6637d8bee44261300ad95ec1\n\n   VMware vCenter Server 4 and modules\n   File size: 1.5 GB\n   File type: .zip\n   MD5SUM: f843d9c19795eb3bc5a77f5c545468a8\n   SHA1SUM: 9a7abd8e70bd983151e2ee40e1b3931525c4480c\n\n   VMware vSphere Client and Host Update Utility\n   File size: 113.8 MB\n   File type: .exe\n   MD5SUM: 6cc6b2c958e7e9529c284e48dfae22a9\n   SHA1SUM: f4c19c63a75d93cffc57b170066358160788c959\n\n   VMware vCenter Converter BootCD\n   File size: 98.8 MB\n   File type: .zip\n   MD5SUM: 3df94eb0e93de76b0389132ada2a3799\n   SHA1SUM: 5d7c04e4f9f8ae25adc8de5963fefd8a4c92464c\n\n   VMware vCenter Converter CLI (Linux)\n   File size: 36.9 MB\n   File type: .tar.gz\n   MD5SUM: 3766097563936ba5e03e87e898f6bd48\n   SHA1SUM: 36d485bdb5eb279296ce8c8523df04bfb12a2cb4\n\n\n   ESXi 4.0 Update 1\n   -----------------\n   ESXi400-200911201-UG\n\nhttps://hostupdate.vmware.com/software/VUM/OFFLINE/release-155-20091116-013169/ESXi-4.0.0-update01.zip\n   md5sum:c6fdd6722d9e5cacb280bdcc2cca0627\n   sha1sum:de9d4875f86b6493f9da991a8cff37784215db2e\n   http://kb.vmware.com/kb/1014886\n\n   NOTE: The three ESXi patches for Firmware, VMware Tools, and the\n         VI Client \"C\" are contained in a single download file. \n\n\n   ESX 4.0 Update 1\n   ----------------\n\nhttps://hostupdate.vmware.com/software/VUM/OFFLINE/release-158-20091118-187517/ESX-4.0.0-update01.zip\n   md5sum: 68934321105c34dcda4cbeeab36a2b8f\n   sha1sum: 0d8ae58cf9143d5c7113af9692dea11ed2dd864b\n   http://kb.vmware.com/kb/1014842\n\n   To install an individual bulletin use esxupdate with the -b option. \n   esxupdate --bundle=ESX-4.0.0-update01.zip -b ESX400-200911223-UG\n   -b ESX400-200911238-SG -b ESX400-200911201-UG -b ESX400-200911235-SG\n   -b ESX400-200911237-SG -b ESX400-200911234-SG -b ESX400-200911232-SG\n   -b ESX400-200911233-SG update\n\n\n5. References\n\n   CVE numbers\n   --- JRE ---\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1093\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1094\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1095\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1096\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1097\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1098\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1099\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1100\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1101\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1102\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1103\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1104\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1105\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1106\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1107\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2670\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2671\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2672\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2673\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2675\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2676\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2716\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2718\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2719\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2720\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2721\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2722\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2723\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2724\n   --- Tomcat ---\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5515\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0033\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0580\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0781\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0783\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1232\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1947\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2370\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5333\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5342\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5461\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6286\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0002\n   --- ntp ---\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0159\n   --- kernel ---\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3528\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5700\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0028\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0269\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0322\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0675\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0676\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0778\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4307\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0834\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1337\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0787\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1336\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1439\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1633\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1072\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1630\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1192\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5966\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1385\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1388\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1389\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1895\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2406\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2407\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2692\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2698\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0745\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0746\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0747\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0748\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2847\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2848\n   --- python ---\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2052\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4965\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1721\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1887\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2315\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3142\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3143\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3144\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4864\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5031\n   --- bind ---\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0696\n   --- libxml and libxml2 ---\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2414\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2416\n   --- curl --\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417\n   --- gnutil ---\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2052\n\n\n- ------------------------------------------------------------------------\n6. Change log\n\n2009-11-20  VMSA-2009-0016\nInitial security advisory after release of vCenter 4.0 Update 1 and\nESX 4.0 Update 1 on 2009-11-19 and release of vMA Patch 2 on 2009-11-23. \n\n- -----------------------------------------------------------------------\n7. Contact\n\nE-mail list for product security notifications and announcements:\nhttp://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\nThis Security Advisory is posted to the following lists:\n\n  * security-announce at lists.vmware.com\n  * bugtraq at securityfocus.com\n  * full-disclosure at lists.grok.org.uk\n\nE-mail:  security at vmware.com\nPGP key at: http://kb.vmware.com/kb/1055\n\nVMware Security Center\nhttp://www.vmware.com/security\n\nVMware security response policy\nhttp://www.vmware.com/support/policies/security_response.html\n\nGeneral support life cycle policy\nhttp://www.vmware.com/support/policies/eos.html\n\nVMware Infrastructure support life cycle policy\nhttp://www.vmware.com/support/policies/lifecycle/\n\nCopyright 2009 VMware Inc.  All rights reserved. \n\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v2.0.11 (GNU/Linux)\nComment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/\n\niEYEARECAAYFAksHAooACgkQS2KysvBH1xmQMACfTEcnuPanvucXPmgJCTT054o+\ndtoAniXz+9xLskrkPr3oUzAcDeV729WG\n=wSRz\n-----END PGP SIGNATURE-----\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- ----------------------------------------------------------------------\nDebian Security Advisory DSA-1844-1                security@debian.org\nhttp://www.debian.org/security/                           Dann Frazier\nJuly 28, 2009                       http://www.debian.org/security/faq\n- ----------------------------------------------------------------------\n\nPackage        : linux-2.6.24\nVulnerability  : denial of service/privilege escalation\nProblem type   : local/remote\nDebian-specific: no\nCVE Id(s)      : CVE-2009-1385 CVE-2009-1389 CVE-2009-1630 CVE-2009-1633\n                 CVE-2009-1895 CVE-2009-1914 CVE-2009-1961 CVE-2009-2406\n                 CVE-2009-2407\n\nSeveral vulnerabilities have been discovered in the Linux kernel that\nmay lead to a denial of service or privilege escalation. \n\nCVE-2009-1895\n\n    Julien Tinnes and Tavis Ormandy reported and issue in the Linux\n    vulnerability code. Local users can take advantage of a setuid\n    binary that can either be made to dereference a NULL pointer or\n    drop privileges and return control to the user. \n\nCVE-2009-1961\n\n    Miklos Szeredi reported an issue in the ocfs2 filesystem. \n    \nCVE-2009-2406\nCVE-2009-2407\n\n    Ramon de Carvalho Valle discovered two issues with the eCryptfs\n    layered filesystem using the fsfuzzer utility. \n    \nFor the stable distribution (etch), these problems have been fixed in\nversion 2.6.24-6~etchnhalf.8etch2. \n\nWe recommend that you upgrade your linux-2.6.24 packages. \n\nNote: Debian \u0027etch\u0027 includes linux kernel packages based upon both the\n2.6.18 and 2.6.24 linux releases.  All known security issues are\ncarefully tracked against both packages and both packages will receive\nsecurity updates until security support for Debian \u0027etch\u0027\nconcludes. However, given the high frequency at which low-severity\nsecurity issues are discovered in the kernel and the resource\nrequirements of doing an update, lower severity 2.6.18 and 2.6.24\nupdates will typically release in a staggered or \"leap-frog\" fashion. \n\nUpgrade instructions\n- --------------------\n\nwget url\n        will fetch the file for you\ndpkg -i file.deb\n        will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n        will update the internal database\napt-get upgrade\n        will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nOldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. \n\nSource archives:\n\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.8etch2.diff.gz\n    Size/MD5 checksum:  4046697 0c540aa51d64fd0f41fefda0370a7d57\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.8etch2.dsc\n    Size/MD5 checksum:     5117 8149bb152305e615760fd5accc516b17\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24.orig.tar.gz\n    Size/MD5 checksum: 59630522 6b8751d1eb8e71498ba74bbd346343af\n\nArchitecture independent packages:\n\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-patch-debian-2.6.24_2.6.24-6~etchnhalf.8etch2_all.deb\n    Size/MD5 checksum:   931690 8230f79880ab579b104e9b34029cc97d\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-manual-2.6.24_2.6.24-6~etchnhalf.8etch2_all.deb\n    Size/MD5 checksum:  1572166 59bdbfc8850a9eb4c7f09229f8481a04\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-source-2.6.24_2.6.24-6~etchnhalf.8etch2_all.deb\n    Size/MD5 checksum: 46892520 c736086affec0e829b80074008edc96d\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-support-2.6.24-etchnhalf.1_2.6.24-6~etchnhalf.8etch2_all.deb\n    Size/MD5 checksum:    97696 ac7c8e4af4d15f8e77817f3a2060621e\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-doc-2.6.24_2.6.24-6~etchnhalf.8etch2_all.deb\n    Size/MD5 checksum:  4469630 76391a2afe93b14ef942260a2ab0f6c4\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-tree-2.6.24_2.6.24-6~etchnhalf.8etch2_all.deb\n    Size/MD5 checksum:    82766 fccf13a8baefeb96443c00718b47178a\n\nalpha architecture (DEC Alpha)\n\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.8etch2_alpha.deb\n    Size/MD5 checksum: 26737560 705e6c1f456e523e4cd6e2199247ad8a\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.8etch2_alpha.deb\n    Size/MD5 checksum: 27342178 b22b7be9f15a3fcd569e83b0981c7b2b\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_alpha.deb\n    Size/MD5 checksum:  3454340 5d9c4195f523265e691a73d165a32bd5\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.8etch2_alpha.deb\n    Size/MD5 checksum:   331144 9b199341a9906f69b92956bee989678f\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.8etch2_alpha.deb\n    Size/MD5 checksum:   330548 2e97270481c6406f4703f7ffc642a306\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-alpha_2.6.24-6~etchnhalf.8etch2_alpha.deb\n    Size/MD5 checksum:    82254 6ef54422427a87fb7013208abbb90bfe\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.8etch2_alpha.deb\n    Size/MD5 checksum: 26758348 3fa44a2c192d5296abff11160c4143f7\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_alpha.deb\n    Size/MD5 checksum:    82234 2d73cbb156467a0e189b66d64d725957\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.8etch2_alpha.deb\n    Size/MD5 checksum:   332176 8abd6e28989d5ffa359dbdf523b8802a\n\namd64 architecture (AMD x86_64 (AMD64))\n\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_amd64.deb\n    Size/MD5 checksum:    82232 f31859776e8c538793ce7bc12e4d16e6\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-amd64_2.6.24-6~etchnhalf.8etch2_amd64.deb\n    Size/MD5 checksum:    82238 0dd51e0668293dc4a112ba7c177a2d62\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.8etch2_amd64.deb\n    Size/MD5 checksum:   355216 e912a184ffa55eefcbf4d075575f956b\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_amd64.deb\n    Size/MD5 checksum:  3649934 25d6d6f81163cd422b987cffe8555482\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.8etch2_amd64.deb\n    Size/MD5 checksum: 19596152 128c3dcd4b54fbca2a8cccf553b15c15\n\narm architecture (ARM)\n\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.8etch2_arm.deb\n    Size/MD5 checksum:   308764 081a21f64a1939858fd628b2b17b1e9d\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_arm.deb\n    Size/MD5 checksum:    82362 a02c06864fb8adb347c7b3b83707ec71\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_arm.deb\n    Size/MD5 checksum:  3937452 4296fde893b88cba41a5164cd6c68266\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.8etch2_arm.deb\n    Size/MD5 checksum:   297832 882e93119837e060496995474bfbde0c\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-arm_2.6.24-6~etchnhalf.8etch2_arm.deb\n    Size/MD5 checksum:    82388 5682b9cb3c9efdf951541c5e951858d5\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.8etch2_arm.deb\n    Size/MD5 checksum:  9356202 12691f5684650f5f808b4ccc3d77e6f6\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.8etch2_arm.deb\n    Size/MD5 checksum: 10777668 be1c3aa597e81f449a1712c059b6d219\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.8etch2_arm.deb\n    Size/MD5 checksum: 10786276 fdfef0d9f0a0f740cdf096efe4076849\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.8etch2_arm.deb\n    Size/MD5 checksum:   306278 243cc2aef642ad3dc3e6faa9f5b7d2ac\n\nhppa architecture (HP PA RISC)\n\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.8etch2_hppa.deb\n    Size/MD5 checksum:   259166 403c84cc8eec53736e11babcd7133c36\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-hppa_2.6.24-6~etchnhalf.8etch2_hppa.deb\n    Size/MD5 checksum:    82390 c1e6ec2b43d6dc4849ab58fcca7708fd\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.8etch2_hppa.deb\n    Size/MD5 checksum:   257800 dcf392b46aaabf4187d0b739d7b3f0b6\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_hppa.deb\n    Size/MD5 checksum:    82356 e67f07544c8505aebf46d0fc5cc6ff9b\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.8etch2_hppa.deb\n    Size/MD5 checksum:   258558 a2e28e8a24b42aa4f092218fdb7b24b0\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.8etch2_hppa.deb\n    Size/MD5 checksum: 14371812 91a757a164d87fcca9b7c8dcf9737e52\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.8etch2_hppa.deb\n    Size/MD5 checksum:   261468 72a0d875029ef878bcfa7734ad0e3221\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_hppa.deb\n    Size/MD5 checksum:  3444724 e4cbc7652241146662a324980caf28e8\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.8etch2_hppa.deb\n    Size/MD5 checksum: 14830286 ee2c1dd21c02e82c845897b92fc44d18\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.8etch2_hppa.deb\n    Size/MD5 checksum: 13846760 3133b7187049be153f3d946556c58d5a\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.8etch2_hppa.deb\n    Size/MD5 checksum: 13335008 a71482e5f95d01ae60ef6f9e84851905\n\ni386 architecture (Intel ia32)\n\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.8etch2_i386.deb\n    Size/MD5 checksum: 19345260 c8d133c7df467610a2b58b02d437f140\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.8etch2_i386.deb\n    Size/MD5 checksum: 19349370 99465914e158a8a8095d704c7a4eca58\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_i386.deb\n    Size/MD5 checksum:    82350 eb75675cf418a8fe18a45cf78e113b14\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.8etch2_i386.deb\n    Size/MD5 checksum: 19589510 ed83c2d0ba92a0f4b5fb5daed6b86d5c\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.8etch2_i386.deb\n    Size/MD5 checksum:   347746 23befd72e069faf404ede7a276b78311\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_i386.deb\n    Size/MD5 checksum:  3647494 9cf283a4c89c8281db35e5fb2ace4335\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-i386_2.6.24-6~etchnhalf.8etch2_i386.deb\n    Size/MD5 checksum:    82384 199633269844e3e36cf936f5a63857a7\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.8etch2_i386.deb\n    Size/MD5 checksum:   361018 4f7299551139e79ad329057ff07de93d\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.8etch2_i386.deb\n    Size/MD5 checksum:   359956 5272e0df584721713692ccb80e8fdc45\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.8etch2_i386.deb\n    Size/MD5 checksum:   361502 4c9a0586154b5fce6d50610d6728bf75\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.8etch2_i386.deb\n    Size/MD5 checksum: 19278068 41f6b91dceeaba5592a15bdbb4170c3a\n\nia64 architecture (Intel ia64)\n\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_ia64.deb\n    Size/MD5 checksum:    82360 e96d164aa97cbda5c4e0d4a4d8d47298\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_ia64.deb\n    Size/MD5 checksum:  3570154 a7bdb15fd5dc46ea33b570390700255a\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.8etch2_ia64.deb\n    Size/MD5 checksum: 32289122 8a66a1efccab804aece0f9c9f9a0c2c3\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-ia64_2.6.24-6~etchnhalf.8etch2_ia64.deb\n    Size/MD5 checksum:    82378 11c070123743f3060aee864a6fa7621e\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.8etch2_ia64.deb\n    Size/MD5 checksum:   322394 7e68b691385f67de57eca947718b3cf3\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.8etch2_ia64.deb\n    Size/MD5 checksum: 32112122 81952edc15d24552bc7e0e250d4e4c2f\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.8etch2_ia64.deb\n    Size/MD5 checksum:   322756 0332b3131abca0dde23a3980e3269d6a\n\nmips architecture (MIPS (Big Endian))\n\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.8etch2_mips.deb\n    Size/MD5 checksum: 22151540 85f675d6aa5e858c776b25ed7b55fd01\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.8etch2_mips.deb\n    Size/MD5 checksum: 17152584 968f51589e2246eb98d54f8f7a0deac3\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.8etch2_mips.deb\n    Size/MD5 checksum:   246524 7d37dee7fa5f20d5484a054697944a4a\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.8etch2_mips.deb\n    Size/MD5 checksum: 11958562 189d907c882ca1f971e5df5b020db861\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.8etch2_mips.deb\n    Size/MD5 checksum:   246320 9b22546464feae45ee05c1318ce4eeb1\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.8etch2_mips.deb\n    Size/MD5 checksum:   214790 9f3182d818ff7b6a05993763a6120725\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.8etch2_mips.deb\n    Size/MD5 checksum: 17168120 bc71f4391f0b74712a77ce0a98104c42\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_mips.deb\n    Size/MD5 checksum:    82240 56ffbcabce3c1df699ab5005b86b5fcb\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.8etch2_mips.deb\n    Size/MD5 checksum: 10524568 1dcc5f02fea750b73b3d26bbf9436744\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.8etch2_mips.deb\n    Size/MD5 checksum:   309414 2f3e51dd53a0aee437acd14822bdc812\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-mips_2.6.24-6~etchnhalf.8etch2_mips.deb\n    Size/MD5 checksum:    82294 9d3e3e23c0fc8a0f1e1841e28fd3a2e2\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_mips.deb\n    Size/MD5 checksum:  3803692 496de2fac6b2631145112d3df8c30a74\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.8etch2_mips.deb\n    Size/MD5 checksum:   309366 ad8430704237cac6706abefb3cb3a66a\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.8etch2_mips.deb\n    Size/MD5 checksum:   225310 6f208c9d5eada9b92d3e98530a7421ab\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.8etch2_mips.deb\n    Size/MD5 checksum: 27775866 480af1976cfb2ad886bbeab57828e0a9\n\nmipsel architecture (MIPS (Little Endian))\n\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.8etch2_mipsel.deb\n    Size/MD5 checksum: 26985726 697670a3bb624d4d3d78f46f3dd1ffa0\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.8etch2_mipsel.deb\n    Size/MD5 checksum: 16630534 64876417bfc90be839f742b7f3df4017\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-mipsel_2.6.24-6~etchnhalf.8etch2_mipsel.deb\n    Size/MD5 checksum:    82296 3b389589e0d350fd94e1e6a55064b597\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.8etch2_mipsel.deb\n    Size/MD5 checksum:   246006 6b907d81792642929e73f8f7138a0686\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_mipsel.deb\n    Size/MD5 checksum:    82244 06ea877ec50d7981c308674e878de0fd\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.8etch2_mipsel.deb\n    Size/MD5 checksum: 21734936 1f58a04e3f3e233fc379f7585b37f67c\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.8etch2_mipsel.deb\n    Size/MD5 checksum:   309876 33999e485bc68c26f1355c34591fa9d1\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.8etch2_mipsel.deb\n    Size/MD5 checksum:   246316 f5ee5c81b6f69590e7483c63914aa4f1\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.8etch2_mipsel.deb\n    Size/MD5 checksum: 13317230 d5c0090dd1f3487c1a1b98e663d302a9\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_mipsel.deb\n    Size/MD5 checksum:  3803662 c04871193e6cd5fe88e7d757fe94dc15\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.8etch2_mipsel.deb\n    Size/MD5 checksum:   246138 83d394f1c4638687b1bd71213d6fc9fd\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.8etch2_mipsel.deb\n    Size/MD5 checksum: 16566994 4ad893a3f64121974125e7df7a246c32\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.8etch2_mipsel.deb\n    Size/MD5 checksum:   308542 d1aa85d73a85243f9e11e6d319829560\n\npowerpc architecture (PowerPC)\n\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.8etch2_powerpc.deb\n    Size/MD5 checksum: 17459600 932f0c6e71fa2a92bcbf91245d4a6f34\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.8etch2_powerpc.deb\n    Size/MD5 checksum: 19195098 3894f438fae8ccd897ae1b193e05a06c\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.8etch2_powerpc.deb\n    Size/MD5 checksum: 19486104 e186a5e57fc6ef416a9f0611b4e32b00\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.8etch2_powerpc.deb\n    Size/MD5 checksum:   321892 920d908f2b7f39a4ea245a452707de9c\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.8etch2_powerpc.deb\n    Size/MD5 checksum:   321508 053a1e68eb59bc3616762c77c478b77c\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_powerpc.deb\n    Size/MD5 checksum:  3672616 9480b5733676cd5d73e984cd6b36cdb2\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.8etch2_powerpc.deb\n    Size/MD5 checksum: 21169994 225176293c099a0a66a6e427f8f342c9\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.8etch2_powerpc.deb\n    Size/MD5 checksum:   321100 ed5daac657617ab8ea09dedbbd5825e9\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_powerpc.deb\n    Size/MD5 checksum:    82240 d5758f3021b63ba5a46f4bb59a0264bd\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-powerpc_2.6.24-6~etchnhalf.8etch2_powerpc.deb\n    Size/MD5 checksum:    82278 68134af3769b6654c610701382a41932\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.8etch2_powerpc.deb\n    Size/MD5 checksum:   294694 6e01dfd311f1094cb5cf39e6ab13030f\n\ns390 architecture (IBM S/390)\n\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390-tape_2.6.24-6~etchnhalf.8etch2_s390.deb\n    Size/MD5 checksum:  1502142 d742c3ccecaeae89dd72efa337ad8d77\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.8etch2_s390.deb\n    Size/MD5 checksum:   194364 95a4fc8d1329f3926c95d0d866ea95c1\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_s390.deb\n    Size/MD5 checksum:  3429940 46b5705e72023ec8eabbeaaae179df0f\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.8etch2_s390.deb\n    Size/MD5 checksum:   194060 0c71ba7ea8c4108e88ce439c83e36101\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_s390.deb\n    Size/MD5 checksum:    82228 f6a160399eb50aed5c7ce0a802977eec\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-s390_2.6.24-6~etchnhalf.8etch2_s390.deb\n    Size/MD5 checksum:    82242 20fa5214b693fd929327b65dff5ec749\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.8etch2_s390.deb\n    Size/MD5 checksum:  7200766 c6697bcd7109bad0fd2742368bfc7173\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.8etch2_s390.deb\n    Size/MD5 checksum:  6950228 2c118466985f0d41c074e3d7ae019d4e\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_sparc.deb\n    Size/MD5 checksum:    82354 917940e7cc2b2ae64b7b13119c8d5cdf\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.8etch2_sparc.deb\n    Size/MD5 checksum:   263544 e8b14218397904ab5f792a659c713900\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.8etch2_sparc.deb\n    Size/MD5 checksum: 13317316 74c832fd75da1e42442c1fc2fb985454\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_sparc.deb\n    Size/MD5 checksum:  3650988 92f721bff0660a92cff31845e3db2b09\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.8etch2_sparc.deb\n    Size/MD5 checksum:   261690 519b6d40d8fc3af21f475b10bfaef609\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-sparc_2.6.24-6~etchnhalf.8etch2_sparc.deb\n    Size/MD5 checksum:    82374 8ff85603936f91294ec959d8fbca1db5\n  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.8etch2_sparc.deb\n    Size/MD5 checksum: 13019920 db00ad3ea888c38b94f6e9c2aebbd834\n\n\n  These changes will probably be included in the oldstable distribution on\n  its next update. ===========================================================\nUbuntu Security Notice USN-793-1              July 02, 2009\nlinux, linux-source-2.6.15 vulnerabilities\nCVE-2009-1072, CVE-2009-1184, CVE-2009-1192, CVE-2009-1242,\nCVE-2009-1265, CVE-2009-1336, CVE-2009-1337, CVE-2009-1338,\nCVE-2009-1360, CVE-2009-1385, CVE-2009-1439, CVE-2009-1630,\nCVE-2009-1633, CVE-2009-1914, CVE-2009-1961\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 6.06 LTS\nUbuntu 8.04 LTS\nUbuntu 8.10\nUbuntu 9.04\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 6.06 LTS:\n  linux-image-2.6.15-54-386       2.6.15-54.77\n  linux-image-2.6.15-54-686       2.6.15-54.77\n  linux-image-2.6.15-54-amd64-generic  2.6.15-54.77\n  linux-image-2.6.15-54-amd64-k8  2.6.15-54.77\n  linux-image-2.6.15-54-amd64-server  2.6.15-54.77\n  linux-image-2.6.15-54-amd64-xeon  2.6.15-54.77\n  linux-image-2.6.15-54-hppa32    2.6.15-54.77\n  linux-image-2.6.15-54-hppa32-smp  2.6.15-54.77\n  linux-image-2.6.15-54-hppa64    2.6.15-54.77\n  linux-image-2.6.15-54-hppa64-smp  2.6.15-54.77\n  linux-image-2.6.15-54-itanium   2.6.15-54.77\n  linux-image-2.6.15-54-itanium-smp  2.6.15-54.77\n  linux-image-2.6.15-54-k7        2.6.15-54.77\n  linux-image-2.6.15-54-mckinley  2.6.15-54.77\n  linux-image-2.6.15-54-mckinley-smp  2.6.15-54.77\n  linux-image-2.6.15-54-powerpc   2.6.15-54.77\n  linux-image-2.6.15-54-powerpc-smp  2.6.15-54.77\n  linux-image-2.6.15-54-powerpc64-smp  2.6.15-54.77\n  linux-image-2.6.15-54-server    2.6.15-54.77\n  linux-image-2.6.15-54-server-bigiron  2.6.15-54.77\n  linux-image-2.6.15-54-sparc64   2.6.15-54.77\n  linux-image-2.6.15-54-sparc64-smp  2.6.15-54.77\n\nUbuntu 8.04 LTS:\n  linux-image-2.6.24-24-386       2.6.24-24.55\n  linux-image-2.6.24-24-generic   2.6.24-24.55\n  linux-image-2.6.24-24-hppa32    2.6.24-24.55\n  linux-image-2.6.24-24-hppa64    2.6.24-24.55\n  linux-image-2.6.24-24-itanium   2.6.24-24.55\n  linux-image-2.6.24-24-lpia      2.6.24-24.55\n  linux-image-2.6.24-24-lpiacompat  2.6.24-24.55\n  linux-image-2.6.24-24-mckinley  2.6.24-24.55\n  linux-image-2.6.24-24-openvz    2.6.24-24.55\n  linux-image-2.6.24-24-powerpc   2.6.24-24.55\n  linux-image-2.6.24-24-powerpc-smp  2.6.24-24.55\n  linux-image-2.6.24-24-powerpc64-smp  2.6.24-24.55\n  linux-image-2.6.24-24-rt        2.6.24-24.55\n  linux-image-2.6.24-24-server    2.6.24-24.55\n  linux-image-2.6.24-24-sparc64   2.6.24-24.55\n  linux-image-2.6.24-24-sparc64-smp  2.6.24-24.55\n  linux-image-2.6.24-24-virtual   2.6.24-24.55\n  linux-image-2.6.24-24-xen       2.6.24-24.55\n\nUbuntu 8.10:\n  linux-image-2.6.27-14-generic   2.6.27-14.35\n  linux-image-2.6.27-14-server    2.6.27-14.35\n  linux-image-2.6.27-14-virtual   2.6.27-14.35\n\nUbuntu 9.04:\n  linux-image-2.6.28-13-generic   2.6.28-13.45\n  linux-image-2.6.28-13-imx51     2.6.28-13.45\n  linux-image-2.6.28-13-iop32x    2.6.28-13.45\n  linux-image-2.6.28-13-ixp4xx    2.6.28-13.45\n  linux-image-2.6.28-13-lpia      2.6.28-13.45\n  linux-image-2.6.28-13-server    2.6.28-13.45\n  linux-image-2.6.28-13-versatile  2.6.28-13.45\n  linux-image-2.6.28-13-virtual   2.6.28-13.45\n\nAfter a standard system upgrade you need to reboot your computer to\neffect the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change for Ubuntu 8.04 and 8.10,\nthe kernel updates have been given a new version number, which requires\nyou to recompile and reinstall all third party kernel modules you\nmight have installed. Unless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-server, linux-powerpc), a standard system\nupgrade will automatically perform this as well. \n\nDetails follow:\n\nIgor Zhbanov discovered that NFS clients were able to create device nodes\neven when root_squash was enabled.  An authenticated remote attacker\ncould create device nodes with open permissions, leading to a loss of\nprivacy or escalation of privileges. Only Ubuntu 8.10 and 9.04 were\naffected. (CVE-2009-1072)\n\nDan Carpenter discovered that SELinux did not correctly handle\ncertain network checks when running with compat_net=1.  A local\nattacker could exploit this to bypass network checks.  Default Ubuntu\ninstallations do not enable SELinux, and only Ubuntu 8.10 and 9.04 were\naffected. (CVE-2009-1184)\n\nShaohua Li discovered that memory was not correctly initialized in the\nAGP subsystem.  A local attacker could potentially read kernel memory,\nleading to a loss of privacy. (CVE-2009-1192)\n\nBenjamin Gilbert discovered that the VMX implementation of KVM did\nnot correctly handle certain registers.  This only affected 32bit hosts. Ubuntu 6.06 was not\naffected. (CVE-2009-1242)\n\nThomas Pollet discovered that the Amateur Radio X.25 Packet Layer Protocol\ndid not correctly validate certain fields.  A remote attacker could exploit\nthis to read kernel memory, leading to a loss of privacy. (CVE-2009-1265)\n\nTrond Myklebust discovered that NFS did not correctly handle certain\nlong filenames. Only Ubuntu 6.06\nwas affected. (CVE-2009-1336)\n\nOleg Nesterov discovered that the kernel did not correctly handle\nCAP_KILL. (CVE-2009-1337)\n\nDaniel Hokka Zakrisson discovered that signal handling was not correctly\nlimited to process namespaces. Only Ubuntu 8.04\nwas affected. (CVE-2009-1338)\n\nPavel Emelyanov discovered that network namespace support for IPv6 was\nnot correctly handled. Only Ubuntu 8.10 and 9.04 were affected. (CVE-2009-1360)\n\nNeil Horman discovered that the e1000 network driver did not correctly\nvalidate certain fields. (CVE-2009-1385)\n\nPavan Naregundi discovered that CIFS did not correctly check lengths\nwhen handling certain mount requests. (CVE-2009-1439)\n\nSimon Vallet and Frank Filz discovered that execute permissions were\nnot correctly handled by NFSv4.  A local user could bypass permissions\nand run restricted programs, possibly leading to an escalation of\nprivileges. (CVE-2009-1633)\n\nMikulas Patocka discovered that /proc/iomem was not correctly\ninitialized on Sparc. Ubuntu 6.06 was not\naffected. (CVE-2009-1914)\n\nMiklos Szeredi discovered that OCFS2 did not correctly handle certain\nsplice operations. Ubuntu 6.06 was not\naffected. (CVE-2009-1961)\n\n\nUpdated packages for Ubuntu 6.06 LTS:\n\n  Source archives:\n\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-54.77.diff.gz\n      Size/MD5:  3001537 eba4f5e0c7a98a38dea67bfa3e168240\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-54.77.dsc\n      Size/MD5:     2400 4ddbb75d160d27e0385fbabe7f1ee16a\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15.orig.tar.gz\n      Size/MD5: 57403387 88ab0747cb8c2ceed662e0fd1b27d81d\n\n  Architecture independent packages:\n\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-doc-2.6.15_2.6.15-54.77_all.deb\n      Size/MD5:  5167494 b57a1f066e6e27335636d97032bac1e4\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-kernel-devel_2.6.15-54.77_all.deb\n      Size/MD5:    95350 6585056cad015d6ca7e28ab593cd8b69\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-54.77_all.deb\n      Size/MD5: 44742940 96f1bf40f8e1197b05d8cc2892f2c145\n\n  amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:    22354 a8efeb55cc67813d523cce4e9a8540ec\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:    44770 ceb8d616dcdd3e0acd2c5f1bc0957167\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:     2306 13cb4639cc7517e3111efdea783b906e\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:    36252 5ef331e5a71c799d054ed67e1af7afb6\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:   102298 94937c4a9294258227c971c9c5e05c5b\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:    38894 eb294ea73d31f1c2f9fda6618ec63770\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:    49144 b633a70773bbbe8acf959b99056c8117\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:   176712 02c0b79f0fa0b1ebf343781974474a4e\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:    36776 8a9d598a72f8199cafd120f3aec583c1\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:   142248 3adf2b7652974e829eaeb41d822a5011\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:    51070 25ec529d7f82bfb0ddcd981304434934\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:   140616 bf360bdcf71309b158123ce3070aaaf9\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:   286860 041ee91c6050c552bd52930dfb7c9f6b\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:    97798 b66af76803a50cf7a3b22c2fbb9f00b4\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:  1651646 756c6cea34752f0bf7a1e829db020e57\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-amd64-generic_2.6.15-54.77_amd64.deb\n      Size/MD5:   871700 f51a4a973ece89338d4843d27a5ced94\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-amd64-k8_2.6.15-54.77_amd64.deb\n      Size/MD5:   872620 cef392fe29c4a2dcfa1ffb9607f990eb\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-amd64-server_2.6.15-54.77_amd64.deb\n      Size/MD5:   872046 e9a140b82a6800dd7c08d8b744e75e2f\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-amd64-xeon_2.6.15-54.77_amd64.deb\n      Size/MD5:   872590 46b39ade35d2e36728d913fe84b6f79d\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54_2.6.15-54.77_amd64.deb\n      Size/MD5:  6925720 a40915984f97b8e817774d8d56155484\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-amd64-generic_2.6.15-54.77_amd64.deb\n      Size/MD5: 20816072 98817474a9a662d4c5d79811547b98ef\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-amd64-k8_2.6.15-54.77_amd64.deb\n      Size/MD5: 20785638 cbf0cd088aeff7b0b87df905b9e8468f\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-amd64-server_2.6.15-54.77_amd64.deb\n      Size/MD5: 21630872 f56a80007a836fec66ef9a2a94883d97\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-amd64-xeon_2.6.15-54.77_amd64.deb\n      Size/MD5: 19903700 98158564170bf417e3ba7f91263f5f31\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:    15646 3894b718b3d312c48c92d9ac52252e5d\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:   240370 a8ee1ef17d8c778484a1b5fdc14777b5\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:   202636 2fbb7c2f21624e8c39388ac167f1bca3\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:  1048602 97b108097bf19f308240d1413ad38b64\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:  1542980 c57046562d168b6e8ee13a25fea0347c\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:   161648 c9463e7a0ebb0c3879f7a6d644751c85\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:     9832 88ec0bfa3382802a777bcbf9dc7d2220\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:    80862 c850080cdc776aabab0c7e0e89cdb13d\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:    49172 99f5fcc78a1beea9bbbf9cb455c45707\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:    35168 9a07d29dedcbed5a44079e64e2bfc911\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:    70884 86d8342ace381ebf07b2f4ead760797c\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:     6224 55a1df7fa8889b89cd3a009d2d84cbb0\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:     9060 9805d4d7b24730a66d881ec8ffccc203\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:    57898 4a0c6ab2237785c56a140bb82818578a\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:   123332 cfa831d03acaba7fdcd38cc296245fd7\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:   101028 f5be2f6c6c299d7c732b59fbfc2ea586\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:    79250 a59e9df8e087eac06df9fbda8a8a6405\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:  1594790 0bc41203b7830a51a6e1a1b9f981ab15\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:    72306 6acc47f96a766cc043ee2a4f47edd3d3\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:    12654 5a615c1146e10d37ef89d0d2ffaf770e\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:    33736 850c53ba72802eba8128f9c69786b663\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:   138534 82827eb2785d66387e75873bcbcb84f9\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:    38938 bb5ec1051b41c083cdd18225b4f0ac24\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb\n      Size/MD5:   278746 1a19131977b00e345ca43f2da7d78f60\n\n  i386 architecture (x86 compatible Intel/AMD):\n\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:    18976 cc2753f5656925c3015c39979cb8cff3\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:    43460 a322e932de50b99745f263a9c2d07e00\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:   105212 c109dd4fd0061a526e506e6419e71b24\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:     2286 47108cbcb70c3749d2b045c6f8c1a1c7\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:    34576 df9c1643a4d064f3db582744ad47a9e0\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:    96952 0fa666be29393ff121f0ff64c45495ea\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:    37102 f4f2833e372e12fabc8237f05e45bf6d\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:    44078 cdcdb874e1bc26abeec66c66c39dd6e2\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:   167754 575f5b4208371c2e5d11fdd1d8856119\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:    33938 8578c3357a6f1ddfddaf863d2ac2cfb4\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:   137870 f46efe5131f63f6f6ee7757d1418b81d\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:    46894 7dc4dc6732d97dcf4ec8e854f5f563c6\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:   132998 a70d2f28ac9f08ef9b505fbe034fa9e2\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:   273450 d6d45586cf1dfff150b030e9ef3de755\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:   102260 7216111ca2c37fc6ef3d6757254f8261\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:  1596062 4d81a723f97979546f7a7032411e88ff\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-386_2.6.15-54.77_i386.deb\n      Size/MD5:   863226 924f92be148cb1bb13db4f7252fd644c\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-686_2.6.15-54.77_i386.deb\n      Size/MD5:   858374 ddd82deb53082e6ce4b6791ed14dd44f\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-k7_2.6.15-54.77_i386.deb\n      Size/MD5:   859558 59451d436d231e187ec193aa4abfe1fc\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-server-bigiron_2.6.15-54.77_i386.deb\n      Size/MD5:   867408 e88f0427e3f965f7c8cfd10cf65255a3\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-server_2.6.15-54.77_i386.deb\n      Size/MD5:   859510 ff4d32a7389bf7ecdb224525699c1868\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54_2.6.15-54.77_i386.deb\n      Size/MD5:  6917458 fd0a57262224b5c9c03b392deee6dba2\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-386_2.6.15-54.77_i386.deb\n      Size/MD5: 21712838 ce53ee29a36dd9cd9228176e6a67d0cf\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-686_2.6.15-54.77_i386.deb\n      Size/MD5: 22508152 f8977584a67f926bce6e172b61d483cc\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-k7_2.6.15-54.77_i386.deb\n      Size/MD5: 22255354 85be88ae00e9c10d859985cfe320b9ba\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-server-bigiron_2.6.15-54.77_i386.deb\n      Size/MD5: 23618958 0dd94a3c4bc391252914ef536a049eaf\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-server_2.6.15-54.77_i386.deb\n      Size/MD5: 23173694 36c092afcfd842937423257362deb71d\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:    15510 9bfea12610a193ecbf077c7dc10b67a2\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:   238530 0d6767483144ccbdfb4d5496dfa1b890\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:   197046 b779aa690688bd0ce620b3feed37c72f\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:  1048392 251f698fe32b7aa18b52b8c930d997a4\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:  1740818 be462a74a24ef70208e5af89879da1fb\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:   160828 bee9438c9a9c524335bbde0b07be1313\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:     9166 1f281ddb8155bd44eca2c0097bd3412e\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:    76484 024d47a314d9e6567fb071e2814622d1\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:    53256 456e910d9e3bde1047c24daef0b5658e\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:    33054 3b0bc0f0738ca6080dd9446a54b22ac7\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:    85630 b46b2de723e39a047552d1bf53422286\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:     6028 efd9e548799433f47e80be328f92e779\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:     8762 da11c1b27b852c13e054d4aec99b9f13\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:    53636 e7c55e0573e7aabc1098bbe9d37c6910\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:   130776 a254b737d82cd35230628f67effd60d3\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:    98432 f772e922c5ca1f3ea8249c702e72cc73\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:    77184 1a3d5fed7e2593cd1e324e81e8f73fbc\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:  1768386 bba934fcf1768f4e6616783b67cc0cb6\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:    69570 672c7fe6f046dc6ec11486a62622ed26\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:    11758 a86954df8c28e894e6849038aec6dd3e\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:    36008 fc0d3c2b5b263bcd9260dcb8a75cf2e3\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:   132566 75fad8a0bac352909402ff2b333fc917\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:    38564 48aa028998c1382beeecf660aa5aac3a\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb\n      Size/MD5:   299114 f11e7eb80349e04b8f23d8a049f76b56\n\n  powerpc architecture (Apple Macintosh G3/G4/G5):\n\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    23724 2db2adaa57d92b7f48688f95179e15e0\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    25950 95c01793a23a24cbff49964e4b8c5585\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    49326 ab284f2d44d7a2bbc5ea52e67f613b23\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    51530 a600f307f0f91779acc5c1980c4c3223\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:     2308 4effd1e0af9c3f48e2243691eb8ff6be\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:     2482 a4633265ec8c02ba24ea472625a3a3ee\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    40196 21e77905b68f5d3872662ab5948dfd94\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    43758 e439eec68bed9e401fec40c0031434d3\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   112596 caf6e08a7b71ca1051b5d94c62029fe3\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   120666 feb6891c9b38bbcc0d58026e14e2a0f5\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    40850 d1933a4df097dba261b11bbae450cc95\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    45958 17b93bb9695be9a7cc0cb8bdac26e767\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    29032 6ca496a4614fc2f0bf880a9f0fdbcb35\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    29900 538fd9bb6ec6ff9c1cb4c61506a2094e\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   211404 5d35841b61601520fa369d152d3bbd42\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   225214 3866f620a880044623bbc963a1b15f8f\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    45056 3fd6ac720a4053a1554c515dbdd60d09\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    40220 342eae2faccd8a8e8235ccbe7a118f44\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:     1936 6eb08d519ab2bf1a5f5fac6e0c832e6d\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:     2200 a2f7579c4986495691a7b124fc34c7c0\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    80680 37cbcb404f7c6d42ddf270cb222d97a0\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    86078 ffb8b233eb68841688aa616f1880fcb7\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   111644 8d3233bee5a2d55582bda79b6bd22f1c\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   125774 b1d8fd5c48d3d50a25da84576e3b1c2e\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    53410 9737ace229facb52faba8819b39aaa4f\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    58474 c0dfc0546cd6a326e8e5372286147ebc\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   147772 5add6e71d59aa7b22544c89d236f1264\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   161708 2e4eaeb64a8a149fe0e89a6aa32c4273\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   317494 e1e4733d8591ebe9372fe88ed3f0c816\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   287602 85599af30985f874baa2005e68247c8a\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   115854 b64bea5344a06582f592f8de8493fea0\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   116514 54a687f3c7d632b17400826c8358eec2\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:  1924292 af79708a135129928126925812c5e985\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:  2447446 600b87a4f5376d7ed6685dde273d1ca6\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-powerpc-smp_2.6.15-54.77_powerpc.deb\n      Size/MD5:   873400 cdb7cb415d400e8e8e9d69fa6a21549d\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-powerpc64-smp_2.6.15-54.77_powerpc.deb\n      Size/MD5:   870866 7252b4b7c1a9b0d65e69939157d86e13\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-powerpc_2.6.15-54.77_powerpc.deb\n      Size/MD5:   868624 fa84e5dae2ee6f9986de8772a1357e23\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54_2.6.15-54.77_powerpc.deb\n      Size/MD5:  6946740 28fc20a94d95b0b8c02aca0708a74101\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-powerpc-smp_2.6.15-54.77_powerpc.deb\n      Size/MD5: 22776364 389e45cbdd998fa7dafa1229f5737bcb\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-powerpc64-smp_2.6.15-54.77_powerpc.deb\n      Size/MD5: 23678834 ea0a1438c2b0a5334b7ac71407cbc868\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-powerpc_2.6.15-54.77_powerpc.deb\n      Size/MD5: 22355382 18f2e503843c54824551f54d39b8b468\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    17782 9933c39eaa26b6c5558399d461d6e4aa\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    17380 4f213deee9b7c625c1fd48d88f048c6c\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   261268 d73545c9cef2251ad094e9e53f889421\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   282478 b037d7889d3f63d86c3605c945f081dc\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   227640 d6a097d06e05da8ae4676497fe918633\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   248884 ca8a5caa96f92834425d7ee4a48a95e2\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:  1048444 f58af64355ebfa8d71973d7961285aea\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:  1048566 32f48ed1ee827656c9446c79d6802b99\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:  1737706 67f6c275ca396042f8613936eda72c97\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:  1877428 8d0bbebe4eb6e4bf964fb6f440af7789\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   250878 c171495228a2d3f25a5dab6a1d46ffe5\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   233632 c6062b42d12fa38bc5fcb59261bfa528\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    13026 e2a2a9c9c0a66e0f66e4971456becb07\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    13526 6393b9447870a049537c64f1da8c0984\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    84832 dafa241b2ba2792acc11ed92ebf58d8a\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    52194 9d681e1cde559db52f919d9a75da2987\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    73908 1b9eea0eb286147c629a5eb6a737bf68\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    85844 9d8a5108c045be78f3aa16ec41863d49\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:     6624 c39e697a9b25473e791b7668df4798d5\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:     7064 02c208ead4772ebd6dfaa1ee19df56cf\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    60376 b83d6031ce6298fd19869d5d29e3a0c4\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    70392 cbaee4dfd466a12dff0b9098baa8788d\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   128550 e4821e65980d609ef08066b2780a485a\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   157808 9a1b4e218e785ecef63b0406c5f9c8a5\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   108038 b472765900eaa08cc2cc54a2ae26d907\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   126050 75623f4ca292e6d3fc2b6e00211f964b\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    87304 2ff71c1735a777692a08170ed726345b\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    93306 ee8b741bf1ee4f57a90da0ed2b6da7d8\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:  2013972 dac2efef3ff9d6289b7309d57cb72745\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:  1988102 c8d45fc53efb2b9f324547fd06ae7409\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   104106 14ccbc627fb90ae558e79b3833e5ba6b\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   115702 19934a14896949c68acbe6f4b6459b0a\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    12738 31ecc1891237ac01baa6d70fa55b2ffa\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    14444 a638ce85cd817ffcd0316b798067af0b\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    39948 0fad0a28b3b61dbce21d2ab2d3e385ec\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    41474 4c179c6570402716b5e16076ee359ff9\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   149308 d381b35191480574c053f931f5d4b838\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   168034 937d9f0067d9c5b86f547355a759ce3a\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    42272 9adfaeeaeec83a69f60bba08b9f7029e\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:    44880 8be844f59b2578d8b0b96df521ed2980\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   320284 ed49feb1ad11dbe9eaebdf8e3b55aa14\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb\n      Size/MD5:   324712 00dc7e4c517a8e77dbdbcd472560fd07\n\n  sparc architecture (Sun SPARC/UltraSPARC):\n\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb\n      Size/MD5:    50478 90ae6fcda7578bfc42fb227db6ed4a16\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb\n      Size/MD5:     2362 81e28a5627bcd9793bdb3d7d66c808e0\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb\n      Size/MD5:    40332 bba6454e4e7a730fc19a71e9f177591b\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb\n      Size/MD5:   110530 ee2bc9880d4119adc01104c26f4c9b45\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb\n      Size/MD5:    41186 22e3751924678d62633868c319ec33bb\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb\n      Size/MD5:   104238 f5357492d5c611bd51c4724b1b955972\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb\n      Size/MD5:     7438 6e66a60e61009df9bc350cde8318fd0e\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb\n      Size/MD5:   149008 d39a3d71f7cdaa48f4603f0d40d7183d\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb\n      Size/MD5:  1711722 024c561786c0bfc1f337cc46a1a99842\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-sparc64-smp_2.6.15-54.77_sparc.deb\n      Size/MD5:   772116 b88f78698771d7b662bd8f55da837860\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-sparc64_2.6.15-54.77_sparc.deb\n      Size/MD5:   771542 ade51cbe986056b296fc493d071add8f\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54_2.6.15-54.77_sparc.deb\n      Size/MD5:  6963002 734ea162d7bdae6fa642fbb65fc4aefd\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-sparc64-smp_2.6.15-54.77_sparc.deb\n      Size/MD5: 15009480 f11efad62b8121702c97f681aaeff50c\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-sparc64_2.6.15-54.77_sparc.deb\n      Size/MD5: 14829506 72058abf59e768b6e7a962a0f1765772\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb\n      Size/MD5:     7422 0fa7e99c434b4c2e616b163473d2482d\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb\n      Size/MD5:   248670 395da4afc2eea6417478e5b9df10eac9\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb\n      Size/MD5:   212452 381c41cde8488c4b922e0d13250ac60d\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb\n      Size/MD5:  1048468 d00527551222987b228c1b3a236b33fa\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb\n      Size/MD5:  1481892 c2a73def45b9c272b0f1b16b24072f74\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb\n      Size/MD5:    10118 6c152d785d4130d9189dfc5562b2918d\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb\n      Size/MD5:    40180 bfdd5a38c85c337948efc354d5b52b1b\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb\n      Size/MD5:     9370 a6b288b0cddcba37aa113b6c6a82c1ac\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb\n      Size/MD5:    61482 f6d84c317c95ca51e4a3a961edd4afbc\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb\n      Size/MD5:   163022 75d6fbd3830d3fa83a4a33087893230f\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb\n      Size/MD5:    64010 b2c069e1a9ab296b69db1c9d9347fdb5\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb\n      Size/MD5:  1235086 983bf44bbfed30448fc00b43e525a222\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb\n      Size/MD5:    59354 ce272f6264ab0b9731c489358ffae596\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb\n      Size/MD5:    37406 39fb3eb53208a1810ef284874296c3ac\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb\n      Size/MD5:   280076 7716ed5dd3c520a43c3774a4e3633047\n\nUpdated packages for Ubuntu 8.04 LTS:\n\n  Source archives:\n\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24-24.55.diff.gz\n      Size/MD5:  4767049 a3e6ddfbd5081bb6e7535fcde2a3f609\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24-24.55.dsc\n      Size/MD5:     2219 ddc04a20e187b20a43a5cecc952e4b59\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24.orig.tar.gz\n      Size/MD5: 59085601 e4aad2f8c445505cbbfa92864f5941ab\n\n  Architecture independent packages:\n\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.24_2.6.24-24.55_all.deb\n      Size/MD5:  4928644 067a5db90758e43f49badf44aadc2ae2\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24_2.6.24-24.55_all.deb\n      Size/MD5:  8142948 27ced16bc9ee340f7d2e59c4d03d4175\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-kernel-devel_2.6.24-24.55_all.deb\n      Size/MD5:    96898 a53b271582fb8cb0f8aa7a3e6ef32d02\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.24_2.6.24-24.55_all.deb\n      Size/MD5: 46978434 5338ae19db39ce537ea7f81fbdfc4a62\n\n  amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:    28590 3b10ec843d4ca2b68122730e1a14b331\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:   224138 5ef7d9b5cad79f6e5b10f8a004ec5cf4\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:    52646 d4bf1babe03ceacbe09131b76a14b9cd\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:    40622 8e880c89feeb75ddcb97eff9a1d2fb3c\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:    48658 639f3170e278823641666c3355710ce9\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:    86268 b2ae6f9d0f3397ab9d56b5ee2604f176\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:    36310 1f5d7ef1723c827f6ec1727b3787f3a9\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:   648378 1e2bb0cf23d1a130795cd9f745e76fe7\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:   209694 0235e8c39f85c8c59e5d8992d2c4d3fa\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:    39192 40b6ff3fb69584a473fd285329e2e2b2\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:    67952 06997f3f9fd155b9d8fd19ed840a7f46\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:   145266 94a9d3bf11d07fda05ba8d37e488c75e\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:   286678 5b1c737aa948d6e03fdc79cea2467968\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:  2128784 32fc2ee9b3e3e5fb2b1c8a2522acc991\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-generic_2.6.24-24.55_amd64.deb\n      Size/MD5:   671194 533f220e2ed87ae41437a2e46d1135bb\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-openvz_2.6.24-24.55_amd64.deb\n      Size/MD5:  1251290 0c12f1ec5d33bf9b98a2cf65411f0cf6\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-rt_2.6.24-24.55_amd64.deb\n      Size/MD5:  1273382 3dd530222979fbc4a0ec5846be3daa2b\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-server_2.6.24-24.55_amd64.deb\n      Size/MD5:   671242 608ed557543bc3b12872b8731ac5594c\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-xen_2.6.24-24.55_amd64.deb\n      Size/MD5:  1082876 c87e898e14f6037d1e4ad8c2c9fbe726\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-24-generic_2.6.24-24.55_amd64.deb\n      Size/MD5: 17801664 16b23af9d06baf9c80b4ffc5b2ac8ce0\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-24-server_2.6.24-24.55_amd64.deb\n      Size/MD5: 17771428 8122d12f5082445f9603d13335b83515\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-24-generic_2.6.24-24.55_amd64.deb\n      Size/MD5: 21014464 68b73490ad11f3343768b5c201c70b25\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-24-server_2.6.24-24.55_amd64.deb\n      Size/MD5: 21387618 3b1bee21e40c69175cd5d1d45c5bf353\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.24-24.55_amd64.deb\n      Size/MD5:   705286 db77b2afae66f80b6692bb8a19cc602e\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:   263680 7f27a9bbc9cefe36cf9dc85d16423bc7\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:   176350 b51e4026bc049983ebd216f31169a41e\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:   253928 a60545ac2ad4d8cdaf08da09e555ad08\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:  1640052 b5d649f457aecfccea9ee1758b546bd9\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:   143684 0290beaef1a4ae3e291e20c517b979cb\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:   164328 9124879a405d861d756f6dbeb40485b0\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:   115838 6edbfc0f6d64e81778feec9bbe7d0388\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:    35062 34b4bfd673f5b69d6a66d357d53913e8\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:    64396 8913719a5eb39424e244f3aa3923ad56\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:    69694 0a45f71737115cdcc8a8a7979bc9c01e\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:    21592 1e5dfd4b78a18cbe0615bfe4e656241d\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:     8618 3353256d9abc6aac3c8904247fad36a8\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:    57178 34272f15a47eaead9a3bb5e8cabc99fe\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:   102988 16f8a54269e7acfeec29642135518312\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:  1212082 7bfdf05b2a0e7a3e2a9bd69bfb74929a\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:    45470 57609f5c992b83ab16b19cb8bdacff4a\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:    12772 ddb48f6ed471562112661169d41c09c3\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:   497808 bd328b4bfef64c9afaddaee236abdb91\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb\n      Size/MD5:    74980 db1542ff52ce70a7fa58d678e70d1ab7\n    http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-24-openvz_2.6.24-24.55_amd64.deb\n      Size/MD5: 19242994 1c7114da74f213cc5cdb9599ecf7233d\n    http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-24-rt_2.6.24-24.55_amd64.deb\n      Size/MD5: 17890604 f7c54711409ec7c911b89a9e8d3cef47\n    http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-24-xen_2.6.24-24.55_amd64.deb\n      Size/MD5: 18900390 a6502ae7ee82cf1393310e22903b2763\n\n  i386 architecture (x86 compatible Intel/AMD):\n\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    23682 1c7aab194616a471285a9d250127a835\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    26764 92a84719d2c4883b366d6d68d1820120\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:   218684 eb3d8b92d6c4a48245724997a6121fc2\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:   220440 40b53586ca28797dc014b8f656cf4725\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    51932 80258fa2f467ec10a1ec94ba389a247e\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    52062 d84d679039a1dcb7a7a6e2be9a11bc9a\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    38324 ff2e0a017b7f58e42c276911d2b763ea\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    39080 50426ae4e5c02d35e95c5351665417cb\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    45866 27ce55188a7e0726ea19ac778c1b20bf\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    46012 ec9111a5e17c2b7cf80a8ec9d7eb574e\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    83200 c17e82497048c7e436642aa16a8b4177\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    83580 d683701699212dcc121fb6c59096a766\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    32396 2476d6800fd166d9923a3b25e7284e37\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    32674 15560eb3ad638e98cf61e9ba41f59040\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:   637392 0fecf174e6f568e2c6c7dad168bc3841\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:   655480 3296fe2e55062e3b5b4b39e79e2104c6\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:   209782 13517227a395e3b14e02c55a04d9b4a3\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:   213588 e303705801fc9b3fb8f04b49c18f8d20\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    46558 47c3d466e4f4e2725a11e60e8869d501\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    47578 3680b979071cb88973c8aa33f94f2037\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    62250 79aec11c8be1c769f018f94cbe9c1e42\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    63618 5f60fbf8b28c79d969bbda9f457e5761\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:   130296 744b0747406ed2d6b4d57eac25a866ae\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:   136874 923a1fde2cf0625dd1a4de29e9738fac\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:   278542 56184e755e1b37390051b10d66615d8e\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:   277118 b273c46bbceb8d256b04295ea3f6bc5c\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:  2008816 96b6e6b4d202c7d4edcd9a4e9257e663\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:  2086100 0199324ff0fe5d6e7d833a3c07a6ac0a\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-386_2.6.24-24.55_i386.deb\n      Size/MD5:   652664 06b4ba3927add4c3a8fb5ee484129bd5\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-generic_2.6.24-24.55_i386.deb\n      Size/MD5:   655538 f1aad1bb26f9fdaea6bee64cdf6e69d7\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-openvz_2.6.24-24.55_i386.deb\n      Size/MD5:  1239292 17b21b1c71a637a1f3470befdc6e244c\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-rt_2.6.24-24.55_i386.deb\n      Size/MD5:  1259626 c857ca06ef5630c9b6faad7c13ef1449\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-server_2.6.24-24.55_i386.deb\n      Size/MD5:   657340 e5fc27b2ba6419ae6110bfdb147dc50a\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-virtual_2.6.24-24.55_i386.deb\n      Size/MD5:   557898 1d6abe04efc461e263605280c3d6a327\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-xen_2.6.24-24.55_i386.deb\n      Size/MD5:  1058088 1de1a8532504cfab66b9afb58aa7fd64\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-24-386_2.6.24-24.55_i386.deb\n      Size/MD5: 18368104 894bae5c45f3313fa6ffde9c5403a050\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-24-generic_2.6.24-24.55_i386.deb\n      Size/MD5: 18389358 0f87aba56c1e970dcc7a05c178764c59\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-24-server_2.6.24-24.55_i386.deb\n      Size/MD5: 18498588 f5c1063f494bd8000f41db10a4c923a3\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-24-virtual_2.6.24-24.55_i386.deb\n      Size/MD5:  8686422 ff430f2f608d318cfdc9ee1f085232c0\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-24-386_2.6.24-24.55_i386.deb\n      Size/MD5: 25497824 3fdb3a0bae1754cc7dcd5fc13e5c92f3\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-24-generic_2.6.24-24.55_i386.deb\n      Size/MD5: 26304704 fbf86e8b9355cd2a4dc4e964ce93a1e1\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-24-server_2.6.24-24.55_i386.deb\n      Size/MD5: 27324298 f2411de5448b6b3dc5041ae93e3fbad8\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-24-virtual_2.6.24-24.55_i386.deb\n      Size/MD5: 24820580 7c3be9e7dca67713529e3f593c28ca8d\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.24-24.55_i386.deb\n      Size/MD5:   705292 e7ea84e2f6120b20e2718223efe47e4a\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:   258744 758ec24355c4c81cb04be0b337b79d22\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:   264062 c3f0e5c7f02e751e8db755eb939e493f\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:   163194 681a38c27b55f122aff23ddc43358e82\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:   162950 64cab9f1cece7117949678fd7022be38\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:   236500 02a04c11e39555ded5a1af39a31f2e1b\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:   244826 1536f32ebccf86886505f5c111275425\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:  1809006 eaa66dd9cdf3cae2f3387bc50b0aca3f\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:  1826238 ef6179911307b224bfbc9442d401168d\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:   150794 3dce18851cd0f9da0e49af7df236dac8\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:   142948 69d90acefce82696bb1db4f68bfc70c9\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:   155958 15a467bdd1e7bdbf50d61a024502acb4\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:   156974 69832b6793dd3c121ae93eada967077d\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:   107174 d2138453acdf0e700bdf074e33e99286\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:   108480 fedf19d305e641f2d3c370dced2309e5\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    32962 e7bd906326133b9381e2cb49c8af646b\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    33388 bcad2f4d1eb61a1d7d795e75854ca434\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    60704 84ae7bb7df1e8102cb7a7a190d963362\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    61154 66fd1b4c06a054c95fad67893640b621\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    82652 ce2130dbd82535557b662084e728928a\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    82958 d439c65c130de9fa29027716f8710874\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    48356 daa2818cfb4b21a7032416c18182b147\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    48244 6a2211f86f7f8df90c5b8ceb38a4a627\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:     8190 b40afdf981d8fe354b20d0bc7cc83c3a\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:     8440 70afae21dbbd5f5cef34294c8de8e725\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    51050 5fe6712265c74000a7d92360c4d1ac81\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    52908 cf6981bb68eb23f899b6a55642238b7b\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    92184 fe7ae21dc89d89b1921f4ed7cbbabf59\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    92448 e18bed4505a2ca45dfd67499c87f3b8b\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:  1442928 f9784301cbe888b3a7610f69210845c9\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:  1426196 fee708e2af1dab92610fb1c3496c95da\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    43236 4b344cdc662f35bad896e8c7bc726f21\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    42796 91578f1e887bac7983dae7884b357616\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    11406 097f3d4965b4fb4b62250309b71ea556\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    12016 4c3681d6ac324a27218a5d7f1eb012a4\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:   470332 975e3f02a4bdd541e27f7c917bcfcb11\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:   472254 3d79ecbffb9a08a25f5e818718137079\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    70450 aeb3fece9342114f992fec68f5d48f71\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb\n      Size/MD5:    71368 a6bb96b015f25d08f5628aeedd3bcb81\n    http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-24-openvz_2.6.24-24.55_i386.deb\n      Size/MD5: 20243576 c1424fd878abdcd2a7bc29fc88369c9b\n    http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-24-rt_2.6.24-24.55_i386.deb\n      Size/MD5: 18527060 4213eff1e17851fd9a6ba77150b54638\n    http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-24-xen_2.6.24-24.55_i386.deb\n      Size/MD5: 18773284 a33c73287198621afbe02e414e91d696\n\n  lpia architecture (Low Power Intel Architecture):\n\n    http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-24-lpia_2.6.24-24.55_lpia.deb\n      Size/MD5:   636610 4747e9fa2334ce46a6f0700646291dd9\n    http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-24-lpiacompat_2.6.24-24.55_lpia.deb\n      Size/MD5:   703234 44e3bcfa9a931471c392192cfb0c54a8\n    http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-24-lpia_2.6.24-24.55_lpia.deb\n      Size/MD5: 14504750 5e482a7e08464985b808a6230a00d1b3\n    http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-24.55_lpia.deb\n      Size/MD5:   705278 c7d8b590dbff2f80c38689e174e2723a\n    http://ports.ubuntu.com/pool/universe/l/linux/linux-image-2.6.24-24-lpiacompat_2.6.24-24.55_lpia.deb\n      Size/MD5: 19810228 4d05fa4a2372061c0c1ac2637ee08ff6\n\n  powerpc architecture (Apple Macintosh G3/G4/G5):\n\n    http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   334050 549350eae9ac212a55977acc795e683f\n    http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   318864 ab27ac3a958eb09b9d12fafd09a77df8\n    http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    62716 00b04f957690db8a0ba8a22438f2e496\n    http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    73002 e8cb037fdde1bdb771482900638bb6d4\n    http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    41434 88738c9f94ad51860b132ec86417d295\n    http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    47824 b3c9f8d3e3d792c644dc6dff2da19df8\n    http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    89458 52a345ac135c1ac50f528412b7d31f75\n    http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   105682 57846bf90eef89a20cdf99b67e2f6b2a\n    http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    44804 3f9bc834fa30a5f15a054bc4a1ffcae0\n    http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    40928 a1c7bfd9166c6dbd96f79c7454d72bb4\n    http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   704240 118333ea34b764806834b8da0975eb32\n    http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   770534 f2ff41faa006ee681e1f0fa467626f98\n    http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   242804 cd1d00ce97f420cc7a7ea0e73b11bc17\n    http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   245874 bddc2d618001db1be1d3330b921e498a\n    http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    69130 630b48f7871d88b3c2ec42ba406b56df\n    http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   132574 c32734e71c98e17a3d3326c2d0caaa03\n    http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    70240 1f2caeecf72dea50709079d5987714e8\n    http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    77438 9c53877ef28007ed1185a93ec5cf90f5\n    http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   146066 8b3b83976cc2eec52b5dbb49568c2b44\n    http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   165040 7e0732ce30c7d287c6897fd89f0eab03\n    http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   387144 7681e85a926a3cfd4bd1101bfe802ef0\n    http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   350038 c70af186448028febde4ce8eb77751f7\n    http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:  2429338 f466200ef72ff34ab3048e67e2fefa4d\n    http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:  3471000 339b6ce1c1190471faa546011cbe67a6\n    http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-24-powerpc-smp_2.6.24-24.55_powerpc.deb\n      Size/MD5:   650754 d55d970951a1844ed71f6e3c91709989\n    http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-24-powerpc64-smp_2.6.24-24.55_powerpc.deb\n      Size/MD5:   654978 1b04d2d2aab7846f7799a90433106d2e\n    http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-24-powerpc_2.6.24-24.55_powerpc.deb\n      Size/MD5:   650486 a9a4f052ac25ea294b6d285808c441da\n    http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-24-powerpc-smp_2.6.24-24.55_powerpc.deb\n      Size/MD5: 20160752 f0ee78fa89e85b317dc850d8a5cd5f4c\n    http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-24-powerpc64-smp_2.6.24-24.55_powerpc.deb\n      Size/MD5: 21366650 f8c2e33729bac5cc66aade8eed5893a9\n    http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-24-powerpc_2.6.24-24.55_powerpc.deb\n      Size/MD5: 19924130 c30583206aa8506e4f8316e3519bb038\n    http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-24.55_powerpc.deb\n      Size/MD5:   695442 60d6d8281a73567a3a1859e603604f2d\n    http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   266766 d734653d249aba57e366ae07a6b1fc93\n    http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   307642 097f927755577ead97570034ae0f6388\n    http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   192170 d8d4fde8fe228d72875d66dd761ed7df\n    http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   201578 5f98ef6e232bfb91d8a91be636a154c9\n    http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   271794 5072cd3330a816dcaa3a77f3805464e3\n    http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   305896 4fe491fccc865c3d73ccf92bae2544b5\n    http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:  1806898 510190e890ad1fc342fafec66b6ab616\n    http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:  2117694 2af9aa4973ab6554eaf799abcff3e1b9\n    http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   235192 379bf968241b634089ebbf2a3ba440e0\n    http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   225202 4066dff0c55796f0af7809947252d479\n    http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   170102 1a3ccf3058cab72bba610082bd9dd390\n    http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   199686 447cab0246a933abfac18838eaac032a\n    http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   117910 9074869c8dad579b52daaafefebd100c\n    http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   139200 06c2711f162832bcaf4141298024f18e\n    http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    45366 e9f0bb9ae84949936a872f1a90ad4118\n    http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    46836 05b95ec8a1a0557f8b82e1b0000e2dcc\n    http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    51136 34dd7d7fb1c2ed5e3d1c737573fb2cd5\n    http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    60286 99bbe8d8d2ffb39ba38190798354c608\n    http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    74166 682080eb95c5a3820aacf3a3654e9a77\n    http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    87206 4e21dc9fe1e1899d668fa3e0a5e15e14\n    http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    76004 1ae6a390c94233465c10686bf504e4bc\n    http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    30226 9649e84d3347d6ff643833bb0911f670\n    http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:     8492 100b04ee69053cb99263a9639d1fe52e\n    http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    10026 9b7c48978f55d3ab82a253db053175d7\n    http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    57368 dbba71ebc8d5e9ab03a061cc143d8c6e\n    http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    68688 9dba3901ed2ccf499412430b8ae02ffe\n    http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   101246 290026d8946c001bd7e2f9e8d6510a6b\n    http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   147768 ad3b8e8f8947d09aa69cbd7f9034e440\n    http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:  1565048 4e7fd21f0fa808514fc1f84e6113e4dd\n    http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:  1514044 2eb4cb565003a82d51c8cc36db03c6e7\n    http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    76680 6c5817e16da05b6017c93af9ac31fe2d\n    http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    85964 45673fac64f8a6d5074a5173bfeb38e0\n    http://ports.ubuntu.com/pool/main/l/linux/socket-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    12710 25923caf1ed00118907a4e61b5df617f\n    http://ports.ubuntu.com/pool/main/l/linux/socket-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    14558 22805c8e35fa454f643f9913f2a0083d\n    http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   449544 ff9ce90996651531510b7880de3d87fd\n    http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   504018 c28ce7f4984fff73f65845d644d956db\n    http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:    83508 cc54fd358a4e6f5b812fefc493f53d49\n    http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb\n      Size/MD5:   108720 70ec0fd895b63491bc5b5e895d23e730\n\n  sparc architecture (Sun SPARC/UltraSPARC):\n\n    http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb\n      Size/MD5:    59596 e0228d1b8d48dcb9b2eeb5a133fd4fea\n    http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb\n      Size/MD5:    71728 1cde4a7c06765886c874a504349c7295\n    http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb\n      Size/MD5:    42454 dede4ea8cdb116e8865de77c903012a6\n    http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb\n      Size/MD5:    91760 fb38bcd0b2c03e153c25569fd6bf6f7f\n    http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb\n      Size/MD5:   587002 31d43eb6a4b4fba550bd644c5e3dab86\n    http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb\n      Size/MD5:   171008 431c1bde571792a29e2c746ac89f4069\n    http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb\n      Size/MD5:    22354 17062dcda3c2018f97dbc320045cff0e\n    http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb\n      Size/MD5:    46050 111c0d79c0bdad8a685f422383037219\n    http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb\n      Size/MD5:   152862 e2cc622a55df2744b07812def8c89239\n    http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb\n      Size/MD5:  2121270 a2a2e37a9c05525401efaffc7ce199e7\n    http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-24-sparc64-smp_2.6.24-24.55_sparc.deb\n      Size/MD5:   562642 a76540180de0ac6e12dac23389ac1b3f\n    http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-24-sparc64_2.6.24-24.55_sparc.deb\n      Size/MD5:   560822 72eb5f3fcb523dd8106850417fd0520e\n    http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-24-sparc64-smp_2.6.24-24.55_sparc.deb\n      Size/MD5: 14090906 2d868fdedfc320b2239dbf301790d1dc\n    http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-24-sparc64_2.6.24-24.55_sparc.deb\n      Size/MD5: 13802896 bf6e9b86cbdede26fd89061b10296551\n    http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-24.55_sparc.deb\n      Size/MD5:   750358 2aa64567f87f3e01794a2c86529da23d\n    http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb\n      Size/MD5:   270052 0ba83932dbed8aeaf6ddd3a29b692a46\n    http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb\n      Size/MD5:   190274 e71570e211349110b3e422c4be949ad2\n    http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb\n      Size/MD5:   262746 5945be1dee0f68cc7c2accaf043bc050\n    http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb\n      Size/MD5:  1385732 1e777b3f2817abf6b080c0716332bbd5\n    http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb\n      Size/MD5:   175218 97800c61086265b7ec2e905295897e5a\n    http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb\n      Size/MD5:   122096 951902334238b51aa9b172b78962db10\n    http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb\n      Size/MD5:    40402 c630c56f90c33e2bd29d18af59670427\n    http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb\n      Size/MD5:    48062 599c33d62648436711413f7d36da2d18\n    http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb\n      Size/MD5:     8700 5d3347aa29bdfac095254b435ed40d98\n    http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb\n      Size/MD5:    60398 53c6a79c562b197f78a7e1fdb4e77e95\n    http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb\n      Size/MD5:   106764 9889da01d9805293d43cab0fd63ffeec\n    http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb\n      Size/MD5:  1001728 2fe7e877334ddd3cf236f6e98f5f46fe\n    http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb\n      Size/MD5:     9512 be22a95339bad90349084fa441b1471f\n    http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb\n      Size/MD5:   391164 43cbe127ea4d0b428ac38c360e235cb3\n    http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb\n      Size/MD5:    75858 d3fd8c3a8134018d37ddc66b7fb0711d\n\nUpdated packages for Ubuntu 8.10:\n\n  Source archives:\n\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27-14.35.diff.gz\n      Size/MD5:  3181140 f341f37430b19a4815761da90e63e255\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27-14.35.dsc\n      Size/MD5:     1491 348bdb8051f6821a99b6e0725c2aca64\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27.orig.tar.gz\n      Size/MD5: 63721466 482b04f680ce6676114ccfaaf8f66a55\n\n  Architecture independent packages:\n\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.27_2.6.27-14.35_all.deb\n      Size/MD5:  3489746 1ff47091f292a7388a12f08f9dc8f8b7\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-14_2.6.27-14.35_all.deb\n      Size/MD5:  5793886 6b12bcd8a9d7fbb597c13d0aa0d285bf\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.27_2.6.27-14.35_all.deb\n      Size/MD5: 52077688 28412f9128132c91c15915a3d5812093\n\n  amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:    36522 304d150ef4d9a9db9695c2ea3eddf798\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:   265178 c0cedca8f9af22d7d35a6f5331e64f46\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:    53460 164d97bf182cdc710089336701669026\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:    43068 27182ab8ec89343ddb1acaadb79d20a8\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:    52322 615253a966a6cfb75cde1ea2e74cdcfb\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:    89740 8ed1b79d7e290f7bf3cb49f50907e370\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:    38172 56c5bfbb21825a4fa74292c63532e201\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:   676692 265d0d3fd047797b08261901f3cb50d1\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:   158538 b27457d63fe234182a931c857b64d242\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:    46344 f4e9b955dc853195fd05ecae5f140794\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:   154248 ad469c83e50590ada6c4b399a6d69854\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:   312772 95e8ea1f4626ae7ced5c93597fbd8af0\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:  2602274 23d7c86bd8d4ad26d754b97a428b74d4\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-14-generic_2.6.27-14.35_amd64.deb\n      Size/MD5:   660580 6c6df3fe5e9f36c47392b8df503fb996\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-14-server_2.6.27-14.35_amd64.deb\n      Size/MD5:   660584 05bb6f130a1faac0e47c59a64cb59e41\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-14-generic_2.6.27-14.35_amd64.deb\n      Size/MD5: 23065618 fe985c117c3b6faee48830f64cabf971\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-14-server_2.6.27-14.35_amd64.deb\n      Size/MD5: 23071172 a9d6617828de879a1ef4a68610f06e43\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-14-virtual_2.6.27-14.35_amd64.deb\n      Size/MD5: 10464288 f91fdb8992629a5ae82cbcb2d383b8e7\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.27-14.35_amd64.deb\n      Size/MD5:   673298 fe94d2d76e3a5dce812d7d8a597637a1\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:   434636 6fe6ed3dc5c57e5a876f2c6c6c7fbb88\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:   186386 338f1bad9040bf0c78ee9397de9398b0\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:   275414 4a5d4c3690aedd96e3eee3d922d73728\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:  1809338 6afa319ea3d9f91e4d16629b86afb1b6\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:   151300 cdf306368201a053d740b4d77bf62c02\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:   194010 d7ed2a96bbd6dcfa75c163511c8b4f7c\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:   168054 27dbc834cddb14ce830806e769efb0b6\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:    36432 95637deca9859881af3edf3db8e06ccc\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:    83440 e97ed7ed724ca8c518927601f6b433b9\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:    71986 1c4c570c1fe15e5cebad90d8a93cf70f\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:    23240 ebaa5d5263395e8517ea82ae3b92ddfc\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:     9012 f865b88210a4c54d8fdc79a9cfbdf4a0\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:    68492 6994b7e19338405c0e127924e67e516d\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:   110292 8e81e11a44a41f94fef4dff4e59e3da3\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:  1275410 34848383b66939762660048e268e8441\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:    47594 9181c757204f49f4d0dac390e83f02a4\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:    13480 a51476c745872d0858d9b7033a64ea9f\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:   393508 9500d323c74c9a330c85183c1686ff49\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:   200788 c5ed4008f970210bb982f80cbce591e4\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb\n      Size/MD5:    13620 2fc4b4f188f9218932d0490308507835\n\n  i386 architecture (x86 compatible Intel/AMD):\n\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:    33922 f40a1e72d099b64c586a6db641443044\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:   244642 b720012479a1cbe6ba08d28302584fc9\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:    55394 90c1f139ebe83c6d6d8b1a1fc1061297\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:    41218 c1b7874af183c54e95df8d57557aa7c0\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:    48654 dfb3c0359053a662017fd9dea0f840ab\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:    86896 3e594eaa10f4598f2c050daf5ee208e5\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:    34058 c5f4fc9d0f61e279e0f6a9b351545b27\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:   675184 eac37d6873c317fec9dbc41af85ce84f\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:   158298 fdb6996d620940e986f9e809a1061414\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:    43598 8d56f44e1e6c01610509b5cdc9ea5f42\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:   145120 47f331154c2773e7861a63965661123a\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:   301946 d7980f5869e46243a45b37625ad61afe\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:  2435224 46b565365b11d793768f04f50a4c248b\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-14-generic_2.6.27-14.35_i386.deb\n      Size/MD5:   643392 3e61d3633116618454601e745e24a863\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-14-server_2.6.27-14.35_i386.deb\n      Size/MD5:   644726 37a677e1e3004e6b42d0958beeb0fda7\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-14-generic_2.6.27-14.35_i386.deb\n      Size/MD5: 23478050 04856487eac811aebdd2a30416889f40\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-14-server_2.6.27-14.35_i386.deb\n      Size/MD5: 23600374 2b9a4093fbdd02dbd054cbe8ca2384f1\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-14-virtual_2.6.27-14.35_i386.deb\n      Size/MD5: 10108412 0d4c0bd4e94cac0ea3b384b6b1d29cb5\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.27-14.35_i386.deb\n      Size/MD5:   673308 dc76499e326c2f5c2e10b547241ed770\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:   432904 836dfe4f7fd217c3d6b4e50ee27ff5ec\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:   171144 e01935798941dc8722f25c9e499d7dba\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:   263706 ad942f31cb448980c110c5d65b4c5938\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:  1993126 9e48f8f227a345c72ae76263b3acc41e\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:   150922 d45e54c03e6524f7409d8ffe6ccbc1fe\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:   183850 26ff7871dda8a29516eb04951e395500\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:   157722 7cefa9c1e1abd9574daa5a2732c8d43b\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:    34498 a323c4253a702888a9ee866bafcac9e5\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:    78252 3306e0596c6ec6a941906ec5cf1b5896\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:    86172 14f820994a04b74bacc55f908ced747a\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:    51176 929ace31f9151a14f646711b57141335\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:     8794 c6ff3050c0e8d61f69978e3a64f3afc0\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:    64308 ab5438618e09f3747c9cabe4d2202d42\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:   102010 d66cf8423068745b1896a2d37087ea57\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:  1449250 cc24f0d8b7411f15f0b3704c92c73719\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:    44514 0763f6eeda9cf0971a5145eeca31a37b\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:    12642 4142729eb596aefe6b55a3c91b537aa7\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:   372528 2ec016366a3c65b130470af25b4f4cd9\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:   189698 577f8d2648589a2620fe4917bcd90e4a\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb\n      Size/MD5:    12992 aaf90b0f25f26915752e0d01ffdf1404\n\nUpdated packages for Ubuntu 9.04:\n\n  Source archives:\n\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28-13.45.diff.gz\n      Size/MD5:  7052018 c30f6c12f534fb270e77a8db16658c00\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28-13.45.dsc\n      Size/MD5:     1988 c31e8f14e5353913483bcbe5134a221a\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28.orig.tar.gz\n      Size/MD5: 66766084 062c29b626a55f09a65532538a6184d4\n\n  Architecture independent packages:\n\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.28_2.6.28-13.45_all.deb\n      Size/MD5:  3630660 dff37123aa2a0a01813aaafa113efeaa\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-13_2.6.28-13.45_all.deb\n      Size/MD5:  8694158 d568990611704c5022f17a406bba56da\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.28_2.6.28-13.45_all.deb\n      Size/MD5: 56896726 2218180442fe2265c4a383718103d24b\n\n  amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:   234530 8ca4ab91f04156b591af5e036a9d9eaf\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:    44110 3d35edf87a693b4aec248c4e110db223\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:    43326 8b5f1e9917275cb49fd5cdc5fe7c372c\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:    51102 a1b090802ce4589182c26704db51e79a\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:    89946 692cdd4f68027d91736aee9507a279a3\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:    37992 40f149752511e8e7d4b527bd321f5f61\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:   521610 a346bd312d8eed61e8bb96fb59f3b9b9\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:   125632 86429c19731c1bbc4fc7025d4659f4e0\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:    58050 dbb7ceb698b6e40a9429b35804416265\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:   312206 2bd5e6bd4338e51c72d349a40a24afb9\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:  3867978 7532ceaadca5ac062476c9a058e87f87\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-13-generic_2.6.28-13.45_amd64.deb\n      Size/MD5:   684590 ce636ed44071caf1eb5696a5b4cd3d52\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-13-server_2.6.28-13.45_amd64.deb\n      Size/MD5:   684602 67c72e9124b19974c39f55341d293d4f\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-13-generic_2.6.28-13.45_amd64.deb\n      Size/MD5: 24250596 54189eb7095f154663e12fcbd03e3052\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-13-server_2.6.28-13.45_amd64.deb\n      Size/MD5: 24255096 11079badc74f668bfa9299a94eee9500\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-13-virtual_2.6.28-13.45_amd64.deb\n      Size/MD5: 10522290 889f00238ab9579a1a3787b6f4093bba\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.28-13.45_amd64.deb\n      Size/MD5:   761032 20f696493a51b361c8211cd3a99773a3\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:   215158 e7434a687dec03b384f88e8e86870b2d\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:   189390 cd7116d69deef0ccd449097583b27125\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:    29396 de5e69d2393ad59f85a530a3a1076f03\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:   274128 a4bb104369c8be8748a38ec66a6649b1\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:  1826044 25d1a4452606ab450f214afd2c6da482\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:   163490 edffca1a4f08889ab04638134e70bdfa\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:   194758 84976648caa181490b9c748f7672e20c\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:   152946 38f0b1e429efc2993fb2f0346daf98d2\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:    36490 09b7bf2b970fab395adc80da34772183\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:     5842 6a537fc3a2af29ba6fd981ce8b2b19f0\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:    72132 2416b9382cc51b3b1c424d52bbf379b0\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:    22716 d5f4dc6ca66de6c6044e2fcfcf9783c5\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:     8878 58927a3e2b4abbb9a3e0e19c969b701a\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:    47470 8cd84b96c9d3b1e32b3e7d29042b4a91\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:    15622 5b3599e51e3513f458430702ba57410a\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:  1272842 175bd4440eb113fa0b72b1c3897457c4\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:    47218 3bf3faa60421de087af2696985c361eb\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:    72626 f431e2290ae3347326ff8b3fc5b5bf98\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:   126946 c82470ee359a4f8d7879367739e73f1d\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb\n      Size/MD5:    13472 0299bdd96f706adde62bcbf1fe873527\n\n  i386 architecture (x86 compatible Intel/AMD):\n\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:   215716 af09e22b5eededba6f06bbce4b6f7f6e\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:    46662 cbb33d90c53ae6c5a277c9f4402188e1\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:    41344 c369ce39d1595df751bf81a7ca1d4831\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:    47378 092cfe8af282c15f332902a0295fe1b4\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:    86848 c2b5e966fc9e4476ab1b6c6fde5bb7a5\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:    33574 e7b69e22af4eb33299e772769f464803\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:   525474 11f2df9f8143a48c6395b3b51fbd964e\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:   125494 feafd7e08878356c984098698d832b72\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:    54864 7bf17f733cf036e0492643870dbc439a\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:   300874 8e5766303f17caafeffc6db2d3590487\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:  3741754 f62502087f0d206a7c43856618b63099\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-13-generic_2.6.28-13.45_i386.deb\n      Size/MD5:   668290 36fb94764dc7b473989ab048f6f8d18d\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-13-server_2.6.28-13.45_i386.deb\n      Size/MD5:   669404 6dcdc4988b80b0d5fad7a49eec4b3f68\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-13-generic_2.6.28-13.45_i386.deb\n      Size/MD5: 24584190 6d3e2aed50aed94ac91512384ae202a8\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-13-server_2.6.28-13.45_i386.deb\n      Size/MD5: 24662820 2f4ac0738424f2295bff2077238b126b\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-13-virtual_2.6.28-13.45_i386.deb\n      Size/MD5: 10219490 e088239542d6b5caa4ba16b16c9ca5ce\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.28-13.45_i386.deb\n      Size/MD5:   761048 a2f34260d40ebb215d26ed09a45e4fe1\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:   218044 3cfad485954208027c844fe40bc0b838\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:   174812 bf413e3a9b0cb7ab124f411ead7df97d\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:    30068 22dfd9b4f06187b520b67d4855f7573f\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:   262414 0e23c7445d3582011f9767101e4af06c\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:  2007452 f84390b7d8d9f8b32c74823649b247aa\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:   150198 05caa7db9bb38f7a42ec7ab0deb6ce47\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:   184298 45df2dcc24ab9a0ffc27da827f246206\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:   143542 5f862fc8f33fc1e4fbcabf78a733f1de\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:    34572 92451114d002c65edb0d89d053a7037e\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:     5502 f39f3f824fff9020a7fa80358fdfe7b9\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:    85990 04a9436fc3c061a9feedf8a46b79a534\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:    47334 7134b0740644c5c266d52dc6d7524d68\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:     8712 cbd3f0e41be40915f413ac5802a6221e\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:    44698 0cd8ea7ec39409e8563ab5c8c9e0248c\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:    14740 c7287bd485367a228246ef8502f3d175\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:  1445196 81a9314640917265a536c3894ceed78a\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:    44092 84aac7e95054a44fcfc589bce5129355\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:    69138 e79c9c942d7e02b83359cc1fe7fe6e6e\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:   119512 ca6a4973ba663fe06f57b52c47b3fe5b\n    http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb\n      Size/MD5:    12672 cff86af5ddbc47b6cc5dbf6892f7f3ad\n\n  lpia architecture (Low Power Intel Architecture):\n\n    http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:   215242 34f3d0cfbebcc281bff8887d58a2fdd1\n    http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:    46662 b60318e129f56b4f1ace761bfcbfeb8c\n    http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:    40950 aaa3fffb7bbd0ad7dbe1a49fd48d3cb0\n    http://ports.ubuntu.com/pool/main/l/linux/fb-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:    47292 4ca4fffc517a758eb5a9dc3dd69eb2c3\n    http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:    86454 ba73d27d65487eed24ef32dade5dd6f3\n    http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:    33270 96d878bfefd1667337a7d781624744fe\n    http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:   523424 3b0daef52c7fbc78f477a82d2885eedb\n    http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:   125172 ca7244bb0c9ea93bf1793fafc8d93249\n    http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:    63536 a2ddb239393108fb7888391bdbcc0235\n    http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:   300334 b0fe7216d15a908a78ef5eee547efef9\n    http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:  3033028 ae4b9666c230f663aa490e5ef7915d3c\n    http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.28-13-lpia_2.6.28-13.45_lpia.deb\n      Size/MD5:   636848 685ad5fdd4837d0fc7670b40fdc55424\n    http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.28-13-lpia_2.6.28-13.45_lpia.deb\n      Size/MD5: 21714272 d7a1bafe41d1f5aaf8c2b67a9171c5df\n    http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.28-13.45_lpia.deb\n      Size/MD5:   761014 ebaf6b30ac3b8f5eeaa396e980eef83f\n    http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:   303684 5e037a0ca19df39904654a98a34a1bc6\n    http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:   157340 00f6f5576c21231b566afa0e2cf8fd61\n    http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:    24440 86b67b982ba9ca31546e0b2a21f0f864\n    http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:   259984 8c79116a9aeb8b302834f8e1fc266955\n    http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:  1925766 1212a0ff61f4eda2f650f309d08be026\n    http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:   149320 40933fec799a654327e69f3e147f84d5\n    http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:   184726 9c6154589bfc80b2dbddd2bcb84427de\n    http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:   143218 050db10728b271bdc222ec1af04581cb\n    http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:    34468 33f04ac2a7c747cace4c3cca47fc5c33\n    http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:     5494 d974930a7f9c6808966eb8a90f7b6e09\n    http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:    85642 67d356fdc7853f0e2080da162297ce7a\n    http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:    47256 d814aa4d377714470bd6acc6a5e310db\n    http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:     8708 97001eca3bfbeea54af2f8754beb6417\n    http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:    63068 f7c2bd8e6e913ccebecc87873d9c5ce3\n    http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:    14688 2bf1158a576fa810d85facf7bfd4b6d2\n    http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:  1446758 b3a985a1ea798516afd4a7afd356a2e9\n    http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:    43890 c37408769b4cd3de313f21dd7c1ae220\n    http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:   154914 2d14ce87eaa2b0f3ab967c818d87648b\n    http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:   172600 716eff2706e585a3064c44ca8fae9ce9\n    http://ports.ubuntu.com/pool/main/l/linux/virtio-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb\n      Size/MD5:     8158 3cac29e81c3e9d2a3d905761f572e74d\n\n. \n    Local users can exploit this vulnerability to gain elevated\n    privileges. Rather, they will be\nreleased in a staggered or \"leap-frog\" fashion. \nUpdates for arm and mips will be released as they become available. (CVE-2009-1184)\n \n The exit_notify function in kernel/exit.c in the Linux kernel\n before 2.6.30-rc1 does not restrict exit signals when the\n CAP_KILL capability is held, which allows local users to send an\n arbitrary signal to a process by running a program that modifies the\n exit_signal field and then uses an exec system call to launch a setuid\n application. (CVE-2009-1337)\n \n The (1) agp_generic_alloc_page and (2) agp_generic_alloc_pages\n functions in drivers/char/agp/generic.c in the agp subsystem in the\n Linux kernel before 2.6.30-rc3 do not zero out pages that may later\n be available to a user-space process, which allows local users to\n obtain sensitive information by reading these pages. (CVE-2009-1192)\n \n The ABI in the Linux kernel 2.6.28 and earlier on s390, powerpc,\n sparc64, and mips 64-bit platforms requires that a 32-bit argument in a\n 64-bit register was properly sign extended when sent from a user-mode\n application, but cannot verify this, which allows local users to\n cause a denial of service (crash) or possibly gain privileges via a\n crafted system call.  The verification\n of md5 checksums and GPG signatures is performed automatically for you.  You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n  http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n  security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID     Date       User ID\n pub  1024D/22458A98 2000-07-10 Mandriva Security Team\n  \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niD8DBQFKORHLmqjQ0CJFipgRAnzRAJ9w1CGojCsYdG001OcNmQuVonRkrwCeNMpH\nbzIigZKDE4V8120vojufik8=\n=cJ+u\n-----END PGP SIGNATURE-----\n. ESX 3.0.3 Update 1,\n   ESX 3.5 Update 5, and VirtualCenter 2.5 Update 6). Refer to section\n   \"End of Product Availability FAQs\" at\n   http://www.vmware.com/support/policies/lifecycle/vi/faq.html for\n   details. \n\n   Extended support for ESX 3.0.3 ends on 2011-12-10.  Users should plan\n   to upgrade to at least ESX 3.5 and preferably to the newest release\n   available. \n\n   ESX 3.5\n   -------\n   http://download3.vmware.com/software/vi/ESX350-201006401-SG.zip\n   md5sum: b89fb8a51c4a896bc0bf297b57645d1d\n   http://kb.vmware.com/kb/1022899\n\n5. References\n\n   CVE numbers\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5029\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5300\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1337\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1385\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1895\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2848\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3002\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3547\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2698\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2692\n\n- ------------------------------------------------------------------------\n\n6",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-1385"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001876"
      },
      {
        "db": "VULHUB",
        "id": "VHN-38831"
      },
      {
        "db": "VULMON",
        "id": "CVE-2009-1385"
      },
      {
        "db": "PACKETSTORM",
        "id": "82837"
      },
      {
        "db": "PACKETSTORM",
        "id": "79774"
      },
      {
        "db": "PACKETSTORM",
        "id": "78871"
      },
      {
        "db": "PACKETSTORM",
        "id": "80419"
      },
      {
        "db": "PACKETSTORM",
        "id": "78985"
      },
      {
        "db": "PACKETSTORM",
        "id": "78500"
      },
      {
        "db": "PACKETSTORM",
        "id": "91054"
      }
    ],
    "trust": 2.43
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-38831",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-38831"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2009-1385",
        "trust": 3.3
      },
      {
        "db": "SECUNIA",
        "id": "35265",
        "trust": 2.6
      },
      {
        "db": "BID",
        "id": "35185",
        "trust": 2.6
      },
      {
        "db": "OSVDB",
        "id": "54892",
        "trust": 2.6
      },
      {
        "db": "SECUNIA",
        "id": "35656",
        "trust": 1.8
      },
      {
        "db": "SECUNIA",
        "id": "35847",
        "trust": 1.8
      },
      {
        "db": "SECUNIA",
        "id": "35566",
        "trust": 1.8
      },
      {
        "db": "SECUNIA",
        "id": "36131",
        "trust": 1.8
      },
      {
        "db": "SECUNIA",
        "id": "35623",
        "trust": 1.8
      },
      {
        "db": "SECUNIA",
        "id": "37471",
        "trust": 1.8
      },
      {
        "db": "SECUNIA",
        "id": "36051",
        "trust": 1.8
      },
      {
        "db": "SECUNIA",
        "id": "36327",
        "trust": 1.8
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2009/06/03/2",
        "trust": 1.8
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-3316",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001876",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200906-053",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "79774",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "80419",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-38831",
        "trust": 0.1
      },
      {
        "db": "VUPEN",
        "id": "2009/3316",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2009-1385",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "82837",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "78871",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "78985",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "78500",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "91054",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-38831"
      },
      {
        "db": "VULMON",
        "id": "CVE-2009-1385"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001876"
      },
      {
        "db": "PACKETSTORM",
        "id": "82837"
      },
      {
        "db": "PACKETSTORM",
        "id": "79774"
      },
      {
        "db": "PACKETSTORM",
        "id": "78871"
      },
      {
        "db": "PACKETSTORM",
        "id": "80419"
      },
      {
        "db": "PACKETSTORM",
        "id": "78985"
      },
      {
        "db": "PACKETSTORM",
        "id": "78500"
      },
      {
        "db": "PACKETSTORM",
        "id": "91054"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200906-053"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1385"
      }
    ]
  },
  "id": "VAR-200906-0598",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-38831"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-29T22:34:44.074000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "kernel-2.6.18-128.9AXS3",
        "trust": 0.8,
        "url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=747"
      },
      {
        "title": "ChangeLog-2.6.30-rc8",
        "trust": 0.8,
        "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.30/ChangeLog-2.6.30-rc8"
      },
      {
        "title": "1835",
        "trust": 0.8,
        "url": "http://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=1835"
      },
      {
        "title": "1992",
        "trust": 0.8,
        "url": "http://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=1992"
      },
      {
        "title": "RHSA-2010:0079",
        "trust": 0.8,
        "url": "https://rhn.redhat.com/errata/RHSA-2010-0079.html"
      },
      {
        "title": "RHSA-2009:1157",
        "trust": 0.8,
        "url": "https://rhn.redhat.com/errata/RHSA-2009-1157.html"
      },
      {
        "title": "RHSA-2009:1550",
        "trust": 0.8,
        "url": "https://rhn.redhat.com/errata/RHSA-2009-1550.html"
      },
      {
        "title": "RHSA-2009:1132",
        "trust": 0.8,
        "url": "https://rhn.redhat.com/errata/RHSA-2009-1132.html"
      },
      {
        "title": "RHSA-2009:1193",
        "trust": 0.8,
        "url": "https://rhn.redhat.com/errata/RHSA-2009-1193.html"
      },
      {
        "title": "RHSA-2009:1132",
        "trust": 0.8,
        "url": "https://www.jp.redhat.com/support/errata/RHSA/RHSA-2009-1132J.html"
      },
      {
        "title": "RHSA-2009:1193",
        "trust": 0.8,
        "url": "https://www.jp.redhat.com/support/errata/RHSA/RHSA-2009-1193J.html"
      },
      {
        "title": "RHSA-2009:1550",
        "trust": 0.8,
        "url": "https://www.jp.redhat.com/support/errata/RHSA/RHSA-2009-1550J.html"
      },
      {
        "title": "Red Hat: Important: kernel security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20091132 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20091193 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: kernel security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20100079 - Security Advisory"
      },
      {
        "title": "Ubuntu Security Notice: linux, linux-source-2.6.15 vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-793-1"
      },
      {
        "title": "Debian Security Advisories: DSA-1844-1 linux-2.6.24 -- denial of service/privilege escalation",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=27df0cdf1377e17825466fd761cfdabd"
      },
      {
        "title": "VMware Security Advisories: ESX 3.5 third party update for Service Console kernel",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=f31282286ef04d7cc8eb581472e20411"
      },
      {
        "title": "VMware Security Advisories: VMware vCenter and ESX update release and vMA patch release address multiple security issues in third party components.",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=4675848a694e2124743f676a2c827ef7"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2009-1385"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001876"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-189",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-38831"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001876"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1385"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "http://www.securityfocus.com/bid/35185"
      },
      {
        "trust": 2.6,
        "url": "http://secunia.com/advisories/35265"
      },
      {
        "trust": 2.6,
        "url": "http://osvdb.org/54892"
      },
      {
        "trust": 1.8,
        "url": "http://www.securityfocus.com/archive/1/505254/100/0/threaded"
      },
      {
        "trust": 1.8,
        "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
      },
      {
        "trust": 1.8,
        "url": "http://www.securityfocus.com/archive/1/512019/100/0/threaded"
      },
      {
        "trust": 1.8,
        "url": "http://secunia.com/advisories/35566"
      },
      {
        "trust": 1.8,
        "url": "http://secunia.com/advisories/35623"
      },
      {
        "trust": 1.8,
        "url": "http://secunia.com/advisories/35656"
      },
      {
        "trust": 1.8,
        "url": "http://secunia.com/advisories/35847"
      },
      {
        "trust": 1.8,
        "url": "http://secunia.com/advisories/36051"
      },
      {
        "trust": 1.8,
        "url": "http://secunia.com/advisories/36131"
      },
      {
        "trust": 1.8,
        "url": "http://secunia.com/advisories/36327"
      },
      {
        "trust": 1.8,
        "url": "http://secunia.com/advisories/37471"
      },
      {
        "trust": 1.8,
        "url": "http://www.vupen.com/english/advisories/2009/3316"
      },
      {
        "trust": 1.8,
        "url": "http://www.debian.org/security/2009/dsa-1844"
      },
      {
        "trust": 1.8,
        "url": "http://www.debian.org/security/2009/dsa-1865"
      },
      {
        "trust": 1.8,
        "url": "https://www.redhat.com/archives/fedora-package-announce/2009-june/msg01094.html"
      },
      {
        "trust": 1.8,
        "url": "https://www.redhat.com/archives/fedora-package-announce/2009-june/msg01193.html"
      },
      {
        "trust": 1.8,
        "url": "https://www.redhat.com/archives/fedora-package-announce/2009-june/msg01048.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2009:135"
      },
      {
        "trust": 1.8,
        "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2009:148"
      },
      {
        "trust": 1.8,
        "url": "http://www.redhat.com/support/errata/rhsa-2009-1157.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.redhat.com/support/errata/rhsa-2009-1193.html"
      },
      {
        "trust": 1.8,
        "url": "https://rhn.redhat.com/errata/rhsa-2009-1550.html"
      },
      {
        "trust": 1.8,
        "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.ubuntu.com/usn/usn-793-1"
      },
      {
        "trust": 1.8,
        "url": "http://www.openwall.com/lists/oss-security/2009/06/03/2"
      },
      {
        "trust": 1.8,
        "url": "http://wiki.rpath.com/advisories:rpsa-2009-0111"
      },
      {
        "trust": 1.8,
        "url": "http://www.intel.com/support/network/sb/cs-030543.htm"
      },
      {
        "trust": 1.8,
        "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/changelog-2.6.30-rc8"
      },
      {
        "trust": 1.8,
        "url": "http://www.vmware.com/security/advisories/vmsa-2009-0016.html"
      },
      {
        "trust": 1.8,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
      },
      {
        "trust": 1.8,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11598"
      },
      {
        "trust": 1.8,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11681"
      },
      {
        "trust": 1.8,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a8340"
      },
      {
        "trust": 1.7,
        "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3ba=commit%3bh=ea30e11970a96cfe5e32c03a29332554573b4a10"
      },
      {
        "trust": 1.7,
        "url": "http://sourceforge.net/project/shownotes.php?release_id=504022\u0026group_id=42302"
      },
      {
        "trust": 1.2,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1385"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-1385"
      },
      {
        "trust": 0.7,
        "url": "https://access.redhat.com/errata/rhsa-2009:1132"
      },
      {
        "trust": 0.6,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1385"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/errata/rhsa-2009:1193"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/errata/rhsa-2009:1550"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/cve/cve-2009-1385"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/errata/rhsa-2009:1157"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/errata/rhsa-2010:0079"
      },
      {
        "trust": 0.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1630"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1633"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1961"
      },
      {
        "trust": 0.3,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1630"
      },
      {
        "trust": 0.3,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1337"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1389"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1337"
      },
      {
        "trust": 0.2,
        "url": "http://kb.vmware.com/kb/1055"
      },
      {
        "trust": 0.2,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1895"
      },
      {
        "trust": 0.2,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2692"
      },
      {
        "trust": 0.2,
        "url": "http://www.vmware.com/security"
      },
      {
        "trust": 0.2,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1633"
      },
      {
        "trust": 0.2,
        "url": "http://www.vmware.com/support/policies/eos.html"
      },
      {
        "trust": 0.2,
        "url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce"
      },
      {
        "trust": 0.2,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2698"
      },
      {
        "trust": 0.2,
        "url": "http://www.vmware.com/support/policies/security_response.html"
      },
      {
        "trust": 0.2,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1192"
      },
      {
        "trust": 0.2,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1389"
      },
      {
        "trust": 0.2,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2848"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1895"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1914"
      },
      {
        "trust": 0.2,
        "url": "http://www.debian.org/security/faq"
      },
      {
        "trust": 0.2,
        "url": "http://security.debian.org/"
      },
      {
        "trust": 0.2,
        "url": "http://www.debian.org/security/"
      },
      {
        "trust": 0.2,
        "url": "http://packages.debian.org/\u003cpkg\u003e"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1192"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1265"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1184"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1360"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2692"
      },
      {
        "trust": 0.2,
        "url": "http://www.mandriva.com/security/"
      },
      {
        "trust": 0.2,
        "url": "http://www.mandriva.com/en/security/kernelupdate"
      },
      {
        "trust": 0.2,
        "url": "http://www.mandriva.com/security/advisories"
      },
      {
        "trust": 0.2,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1961"
      },
      {
        "trust": 0.1,
        "url": "http://sourceforge.net/project/shownotes.php?release_id=504022\u0026amp;group_id=42302"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/189.html"
      },
      {
        "trust": 0.1,
        "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ea30e11970a96cfe5e32c03a29332554573b4a10"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://usn.ubuntu.com/793-1/"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1102"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1099"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1098"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0745"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-5515"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2671"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0675"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2671"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0033"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1096"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2052"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2315"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2370"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2416"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1093"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1095"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2718"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1101"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1094"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1099"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2724"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-5031"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0159"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3143"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1439"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2716"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4864"
      },
      {
        "trust": 0.1,
        "url": "http://downloads.vmware.com/download/download.do?downloadgroup=vc40u1"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3142"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3144"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1093"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2407"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2673"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1887"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2723"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0778"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2676"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1096"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1721"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2675"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1103"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1097"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0746"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1103"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2670"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0747"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1106"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1102"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2414"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4965"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0748"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0834"
      },
      {
        "trust": 0.1,
        "url": "http://kb.vmware.com/kb/1014842"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2847"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5461"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4307"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1097"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1105"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3528"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2406"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2720"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2625"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2417"
      },
      {
        "trust": 0.1,
        "url": "http://www.vmware.com/resources/techresources/726"
      },
      {
        "trust": 0.1,
        "url": "http://www.vmware.com/support/policies/lifecycle/"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1232"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2670"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1106"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2722"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1094"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0781"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-6286"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0783"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1107"
      },
      {
        "trust": 0.1,
        "url": "https://hostupdate.vmware.com/software/vum/offline/release-155-20091116-013169/esxi-4.0.0-update01.zip"
      },
      {
        "trust": 0.1,
        "url": "https://hostupdate.vmware.com/software/vum/offline/release-158-20091118-187517/esx-4.0.0-update01.zip"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1101"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1104"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1252"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1100"
      },
      {
        "trust": 0.1,
        "url": "http://enigmail.mozdev.org/"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0676"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0028"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0696"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1072"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1336"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1947"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5333"
      },
      {
        "trust": 0.1,
        "url": "http://kb.vmware.com/kb/1014886"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1104"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2721"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0269"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5342"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1098"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1388"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1107"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1100"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0002"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-5700"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5966"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0580"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0322"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2672"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1095"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2719"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2625"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0787"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1105"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-hppa_2.6.24-6~etchnhalf.8etch2_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.8etch2_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.8etch2_mips.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-manual-2.6.24_2.6.24-6~etchnhalf.8etch2_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.8etch2_ia64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.8etch2_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.8etch2_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.8etch2_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.8etch2_mips.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-mips_2.6.24-6~etchnhalf.8etch2_mips.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.8etch2_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.8etch2_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_ia64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-mipsel_2.6.24-6~etchnhalf.8etch2_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.8etch2_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390_2.6.24-6~etchnhalf.8etch2_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-amd64_2.6.24-6~etchnhalf.8etch2_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.8etch2_arm.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_arm.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.8etch2_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.8etch2_arm.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.8etch2_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-source-2.6.24_2.6.24-6~etchnhalf.8etch2_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.8etch2_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.8etch2_ia64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.8etch2_mips.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_ia64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390-tape_2.6.24-6~etchnhalf.8etch2_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2407"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-alpha_2.6.24-6~etchnhalf.8etch2_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.8etch2_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.8etch2_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.8etch2_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.8etch2_arm.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-ia64_2.6.24-6~etchnhalf.8etch2_ia64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.8etch2_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.8etch2_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.8etch2_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-itanium_2.6.24-6~etchnhalf.8etch2_ia64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.8etch2_mips.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-generic_2.6.24-6~etchnhalf.8etch2_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.8etch2_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc64-smp_2.6.24-6~etchnhalf.8etch2_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.8etch2_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.8etch2_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.8etch2_mips.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.8etch2_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.8etch2_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r4k-ip22_2.6.24-6~etchnhalf.8etch2_mips.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-tree-2.6.24_2.6.24-6~etchnhalf.8etch2_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.8etch2.diff.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.8etch2_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.8etch2_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.8etch2_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-s390_2.6.24-6~etchnhalf.8etch2_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.8etch2_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.8etch2_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-patch-debian-2.6.24_2.6.24-6~etchnhalf.8etch2_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-doc-2.6.24_2.6.24-6~etchnhalf.8etch2_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.8etch2_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-iop32x_2.6.24-6~etchnhalf.8etch2_arm.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_mips.deb"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2406"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-i386_2.6.24-6~etchnhalf.8etch2_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-mckinley_2.6.24-6~etchnhalf.8etch2_ia64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-sparc_2.6.24-6~etchnhalf.8etch2_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.8etch2_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sparc64_2.6.24-6~etchnhalf.8etch2_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1a-bcm91480b_2.6.24-6~etchnhalf.8etch2_mips.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-powerpc-smp_2.6.24-6~etchnhalf.8etch2_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-686-bigmem_2.6.24-6~etchnhalf.8etch2_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-smp_2.6.24-6~etchnhalf.8etch2_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-486_2.6.24-6~etchnhalf.8etch2_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-arm_2.6.24-6~etchnhalf.8etch2_arm.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_arm.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-support-2.6.24-etchnhalf.1_2.6.24-6~etchnhalf.8etch2_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all_2.6.24-6~etchnhalf.8etch2_mips.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-r5k-cobalt_2.6.24-6~etchnhalf.8etch2_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.8etch2_mips.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc-miboot_2.6.24-6~etchnhalf.8etch2_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc_2.6.24-6~etchnhalf.8etch2_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.8etch2_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-5kc-malta_2.6.24-6~etchnhalf.8etch2_mips.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-powerpc64_2.6.24-6~etchnhalf.8etch2_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-ixp4xx_2.6.24-6~etchnhalf.8etch2_arm.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24.orig.tar.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sparc64-smp_2.6.24-6~etchnhalf.8etch2_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.8etch2_mips.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc64_2.6.24-6~etchnhalf.8etch2_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-parisc_2.6.24-6~etchnhalf.8etch2_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-common_2.6.24-6~etchnhalf.8etch2_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-r5k-ip32_2.6.24-6~etchnhalf.8etch2_mips.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-sb1-bcm91250a_2.6.24-6~etchnhalf.8etch2_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-686_2.6.24-6~etchnhalf.8etch2_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-all-powerpc_2.6.24-6~etchnhalf.8etch2_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-s390x_2.6.24-6~etchnhalf.8etch2_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-2.6.24_2.6.24-6~etchnhalf.8etch2.dsc"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-alpha-legacy_2.6.24-6~etchnhalf.8etch2_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-footbridge_2.6.24-6~etchnhalf.8etch2_arm.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-amd64_2.6.24-6~etchnhalf.8etch2_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-headers-2.6.24-etchnhalf.1-4kc-malta_2.6.24-6~etchnhalf.8etch2_mips.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-image-2.6.24-etchnhalf.1-parisc-smp_2.6.24-6~etchnhalf.8etch2_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-14-generic_2.6.27-14.35_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-13-virtual_2.6.28-13.45_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-powerpc_2.6.15-54.77_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-13-server_2.6.28-13.45_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-13-generic_2.6.28-13.45_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-24-rt_2.6.24-24.55_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.27_2.6.27-14.35_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-powerpc64-smp_2.6.15-54.77_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54_2.6.15-54.77_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.28-13-lpia_2.6.28-13.45_lpia.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-rt_2.6.24-24.55_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-13-generic_2.6.28-13.45_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-powerpc-smp_2.6.15-54.77_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24.orig.tar.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/socket-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-14-virtual_2.6.27-14.35_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-386_2.6.15-54.77_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-24-powerpc-smp_2.6.24-24.55_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-generic_2.6.24-24.55_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/fb-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28-13.45.dsc"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-powerpc64-smp_2.6.15-54.77_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54_2.6.15-54.77_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-openvz_2.6.24-24.55_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-24-generic_2.6.24-24.55_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-server-bigiron_2.6.15-54.77_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-24-server_2.6.24-24.55_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-server_2.6.15-54.77_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-generic_2.6.24-24.55_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15.orig.tar.gz"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1242"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.28_2.6.28-13.45_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.27-14.35_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-powerpc_2.6.15-54.77_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-24-powerpc-smp_2.6.24-24.55_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.28-13.45_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-386_2.6.24-24.55_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-13-virtual_2.6.28-13.45_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/universe/l/linux/linux-image-2.6.24-24-lpiacompat_2.6.24-24.55_lpia.deb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-k7_2.6.15-54.77_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-14-server_2.6.27-14.35_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-24-rt_2.6.24-24.55_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-24-virtual_2.6.24-24.55_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-24-generic_2.6.24-24.55_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28.orig.tar.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-rt_2.6.24-24.55_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-13_2.6.28-13.45_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-14-server_2.6.27-14.35_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/socket-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-24-lpia_2.6.24-24.55_lpia.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/sata-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-24-openvz_2.6.24-24.55_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.28-13-lpia_2.6.28-13.45_lpia.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-server_2.6.24-24.55_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-server_2.6.15-54.77_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-24-powerpc64-smp_2.6.24-24.55_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-amd64-xeon_2.6.15-54.77_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-14-server_2.6.27-14.35_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-amd64-server_2.6.15-54.77_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1439"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-24-powerpc_2.6.24-24.55_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-24-sparc64-smp_2.6.24-24.55_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.24-24.55_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.28-13.45_lpia.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-14_2.6.27-14.35_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-doc-2.6.15_2.6.15-54.77_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/ipv6-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-686_2.6.15-54.77_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-openvz_2.6.24-24.55_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-amd64-generic_2.6.15-54.77_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.24_2.6.24-24.55_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-24-generic_2.6.24-24.55_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-24-server_2.6.24-24.55_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-24-xen_2.6.24-24.55_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/parport-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/pcmcia-storage-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipv6-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-sparc64_2.6.15-54.77_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27-14.35.dsc"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-24-lpiacompat_2.6.24-24.55_lpia.deb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-core-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext3-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24_2.6.24-24.55_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54_2.6.15-54.77_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-14-server_2.6.27-14.35_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-amd64-k8_2.6.15-54.77_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-24-generic_2.6.24-24.55_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-24-powerpc64-smp_2.6.24-24.55_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/acpi-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1072"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-amd64-server_2.6.15-54.77_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-24-sparc64-smp_2.6.24-24.55_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fs-common-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-sparc64-smp_2.6.15-54.77_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-xen_2.6.24-24.55_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.28-13.45_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1336"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24-24.55.diff.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-13-generic_2.6.28-13.45_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-k7_2.6.15-54.77_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-powerpc-smp_2.6.15-54.77_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/jfs-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.24-24.55.dsc"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-24.55_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/virtio-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-24-lpia_2.6.24-24.55_lpia.deb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/kernel-image-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/firewire-core-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-sparc64_2.6.15-54.77_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-24.55_lpia.deb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-24-sparc64_2.6.24-24.55_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-24-386_2.6.24-24.55_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-24-xen_2.6.24-24.55_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-firmware-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-54.77_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-24-server_2.6.24-24.55_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/block-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/hfs-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-14-virtual_2.6.27-14.35_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-core-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.27-14.35_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ufs-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/scsi-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/serial-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/universe/l/linux/linux-image-2.6.24-24-openvz_2.6.24-24.55_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27-14.35.diff.gz"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/mouse-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/plip-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.27.orig.tar.gz"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/firewire-core-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.27-14-generic_2.6.27-14.35_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-kernel-devel_2.6.15-54.77_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-13-generic_2.6.28-13.45_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ntfs-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-13-server_2.6.28-13.45_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/xfs-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.24_2.6.24-24.55_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-shared-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_2.6.24-24.55_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-sparc64-smp_2.6.15-54.77_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-pcmcia-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-amd64-xeon_2.6.15-54.77_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ipv6-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1338"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-54.77.diff.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54_2.6.15-54.77_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.24-24-virtual_2.6.24-24.55_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/md-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ext2-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-source-2.6.15_2.6.15-54.77.dsc"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc-2.6.27_2.6.27-14.35_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nfs-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ide-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-386_2.6.15-54.77_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-amd64-generic_2.6.15-54.77_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/cdrom-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/floppy-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-24-server_2.6.24-24.55_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-storage-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-usb-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux_2.6.28-13.45.diff.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-2.6.28_2.6.28-13.45_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-debug-2.6.24-24-386_2.6.24-24.55_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-storage-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/socket-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/plip-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-amd64-k8_2.6.15-54.77_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.27-14-generic-di_2.6.27-14.35_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/acpi-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-image-2.6.24-24-powerpc_2.6.24-24.55_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-2.6.24-24-sparc64_2.6.24-24.55_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/message-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/pata-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/loop-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.28-13-server_2.6.28-13.45_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/sata-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_2.6.24-24.55_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/crc-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/nic-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/parport-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-virtual_2.6.24-24.55_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-kernel-devel_2.6.24-24.55_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-server_2.6.24-24.55_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fat-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-14-generic_2.6.27-14.35_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/fat-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/usb-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/affs-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/pcmcia-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/reiserfs-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/md-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/input-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ide-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/irda-modules-2.6.28-13-lpia-di_2.6.28-13.45_lpia.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.27-14-generic_2.6.27-14.35_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/serial-modules-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/socket-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/usb-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.24-24-generic-di_2.6.24-24.55_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-image-2.6.15-54-server-bigiron_2.6.15-54.77_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/input-modules-2.6.15-54-386-di_2.6.15-54.77_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/ppp-modules-2.6.15-54-sparc64-di_2.6.15-54.77_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-54-powerpc64-smp-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-2.6.27-14-generic-di_2.6.27-14.35_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/fb-modules-2.6.15-54-powerpc-di_2.6.15-54.77_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-2.6.24-24-xen_2.6.24-24.55_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-2.6.28-13-generic-di_2.6.28-13.45_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/ide-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-2.6.24-24-powerpc64-smp-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/irda-modules-2.6.15-54-amd64-generic-di_2.6.15-54.77_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-2.6.24-24-386-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.15/linux-headers-2.6.15-54-686_2.6.15-54.77_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/nic-pcmcia-modules-2.6.24-24-powerpc-di_2.6.24-24.55_powerpc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-2.6.28-13-server_2.6.28-13.45_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://ports.ubuntu.com/pool/main/l/linux/kernel-image-2.6.24-24-sparc64-di_2.6.24-24.55_sparc.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-2.6.24-24-generic-di_2.6.24-24.55_i386.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-2.6.28-13-generic-di_2.6.28-13.45_amd64.udeb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc-smp_2.6.18.dfsg.1-24etch3_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-amd64_2.6.18.dfsg.1-24etch3_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-686_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-mckinley_2.6.18.dfsg.1-24etch3_ia64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.24etch3.dsc"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-24etch3_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-qemu_2.6.18.dfsg.1-24etch3_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-24etch3_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-24etch3_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-24etch3_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-24etch3_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-24etch3_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch3_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390x_2.6.18.dfsg.1-24etch3_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-24etch3_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch3_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-24etch3_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-686-bigmem_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-itanium_2.6.18.dfsg.1-24etch3_ia64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-24etch3_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-s390x_2.6.18.dfsg.1-24etch3_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-k7_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-24etch3_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-686_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64_2.6.18.dfsg.1-24etch3_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc-smp_2.6.18.dfsg.1-24etch3_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-24etch3_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-hppa_2.6.18.dfsg.1-24etch3_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-amd64_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-24etch3_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch3_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-24etch3_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-686_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch3_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-k7_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch3_ia64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.24etch3.tar.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-24etch3_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-24etch3_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-24etch3_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-686_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-486_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-24etch3_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-24etch3_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-24etch3_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.24etch3_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch3_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-24etch3_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-686_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch3_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch3_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen_2.6.18.dfsg.1-24etch3_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-24etch3_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-24etch3_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-24etch3_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-amd64_2.6.18.dfsg.1-24etch3_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-s390_2.6.18.dfsg.1-24etch3_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-24etch3_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch3_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc_2.6.18.dfsg.1-24etch3_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-i386_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r5k-cobalt_2.6.18.dfsg.1-24etch3_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sparc32_2.6.18.dfsg.1-24etch3_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch3_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-xen-vserver_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-24etch3.dsc"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-powerpc_2.6.18.dfsg.1-24etch3_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-24etch3_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-24etch3_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-prep_2.6.18.dfsg.1-24etch3_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-legacy_2.6.18.dfsg.1-24etch3_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc64_2.6.18.dfsg.1-24etch3_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch3_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64_2.6.18.dfsg.1-24etch3_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um.orig.tar.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-amd64_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc64_2.6.18.dfsg.1-24etch3_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch3_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-mipsel_2.6.18.dfsg.1-24etch3_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-mckinley_2.6.18.dfsg.1-24etch3_ia64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc32_2.6.18.dfsg.1-24etch3_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc64_2.6.18.dfsg.1-24etch3_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc-smp_2.6.18.dfsg.1-24etch3_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-amd64_2.6.18.dfsg.1-24etch3_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-parisc_2.6.18.dfsg.1-24etch3_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-24etch3_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-itanium_2.6.18.dfsg.1-24etch3_ia64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-24etch3_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc-miboot_2.6.18.dfsg.1-24etch3_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-alpha_2.6.18.dfsg.1-24etch3_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc_2.6.18.dfsg.1-24etch3_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-sb1-bcm91250a_2.6.18.dfsg.1-24etch3_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-ia64_2.6.18.dfsg.1-24etch3_ia64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-amd64_2.6.18.dfsg.1-24etch3_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.24etch3.dsc"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6_2.6.18.dfsg.1-24etch3_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.18-6-xen-686_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-powerpc_2.6.18.dfsg.1-24etch3_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.18-6_2.6.18.dfsg.1-24etch3_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64-smp_2.6.18.dfsg.1-24etch3_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-amd64_2.6.18.dfsg.1-24etch3_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390-tape_2.6.18.dfsg.1-24etch3_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-486_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-24etch3_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sb1a-bcm91480b_2.6.18.dfsg.1-24etch3_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-24etch3_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver_2.6.18.dfsg.1-24etch3_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-s390_2.6.18.dfsg.1-24etch3_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-parisc64_2.6.18.dfsg.1-24etch3_hppa.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch3_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-powerpc64_2.6.18.dfsg.1-24etch3_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-vserver-sparc64_2.6.18.dfsg.1-24etch3_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-amd64_2.6.18.dfsg.1-24etch3_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390x_2.6.18.dfsg.1-24etch3_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-powerpc_2.6.18.dfsg.1-24etch3_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-sparc64-smp_2.6.18.dfsg.1-24etch3_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-24etch3_all.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-smp_2.6.18.dfsg.1-24etch3_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-k7_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-alpha_2.6.18.dfsg.1-24etch3_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch3_ia64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-alpha-generic_2.6.18.dfsg.1-24etch3_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-xen-vserver-686_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r4k-kn04_2.6.18.dfsg.1-24etch3_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-vserver-amd64_2.6.18.dfsg.1-24etch3_amd64.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-k7_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/f/fai-kernels/fai-kernels_1.17+etch.24etch3_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-generic_2.6.18.dfsg.1-24etch3_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-s390_2.6.18.dfsg.1-24etch3_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-qemu_2.6.18.dfsg.1-24etch3_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-prep_2.6.18.dfsg.1-24etch3_powerpc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-r3k-kn02_2.6.18.dfsg.1-24etch3_mipsel.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1.orig.tar.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.24etch3.diff.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all_2.6.18.dfsg.1-24etch3_s390.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-all-sparc_2.6.18.dfsg.1-24etch3_sparc.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.18-6-686-bigmem_2.6.18.dfsg.1-24etch3_i386.deb"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-24etch3.diff.gz"
      },
      {
        "trust": 0.1,
        "url": "http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.18-6-alpha-smp_2.6.18.dfsg.1-24etch3_alpha.deb"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0029"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1184"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1265"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0029"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1360"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3547"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2848"
      },
      {
        "trust": 0.1,
        "url": "http://download3.vmware.com/software/vi/esx350-201006401-sg.zip"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2698"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-5029"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3547"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3002"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-5300"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3002"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2008-5029"
      },
      {
        "trust": 0.1,
        "url": "http://kb.vmware.com/kb/1022899"
      },
      {
        "trust": 0.1,
        "url": "http://www.vmware.com/support/policies/eos_vi.html"
      },
      {
        "trust": 0.1,
        "url": "http://www.vmware.com/support/policies/lifecycle/vi/faq.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2008-5300"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-38831"
      },
      {
        "db": "VULMON",
        "id": "CVE-2009-1385"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001876"
      },
      {
        "db": "PACKETSTORM",
        "id": "82837"
      },
      {
        "db": "PACKETSTORM",
        "id": "79774"
      },
      {
        "db": "PACKETSTORM",
        "id": "78871"
      },
      {
        "db": "PACKETSTORM",
        "id": "80419"
      },
      {
        "db": "PACKETSTORM",
        "id": "78985"
      },
      {
        "db": "PACKETSTORM",
        "id": "78500"
      },
      {
        "db": "PACKETSTORM",
        "id": "91054"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200906-053"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1385"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-38831"
      },
      {
        "db": "VULMON",
        "id": "CVE-2009-1385"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001876"
      },
      {
        "db": "PACKETSTORM",
        "id": "82837"
      },
      {
        "db": "PACKETSTORM",
        "id": "79774"
      },
      {
        "db": "PACKETSTORM",
        "id": "78871"
      },
      {
        "db": "PACKETSTORM",
        "id": "80419"
      },
      {
        "db": "PACKETSTORM",
        "id": "78985"
      },
      {
        "db": "PACKETSTORM",
        "id": "78500"
      },
      {
        "db": "PACKETSTORM",
        "id": "91054"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200906-053"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-1385"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2009-06-04T00:00:00",
        "db": "VULHUB",
        "id": "VHN-38831"
      },
      {
        "date": "2009-06-04T00:00:00",
        "db": "VULMON",
        "id": "CVE-2009-1385"
      },
      {
        "date": "2009-08-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-001876"
      },
      {
        "date": "2009-11-20T22:21:26",
        "db": "PACKETSTORM",
        "id": "82837"
      },
      {
        "date": "2009-07-29T18:53:58",
        "db": "PACKETSTORM",
        "id": "79774"
      },
      {
        "date": "2009-07-02T15:40:16",
        "db": "PACKETSTORM",
        "id": "78871"
      },
      {
        "date": "2009-08-17T18:33:30",
        "db": "PACKETSTORM",
        "id": "80419"
      },
      {
        "date": "2009-07-07T23:53:14",
        "db": "PACKETSTORM",
        "id": "78985"
      },
      {
        "date": "2009-06-17T22:54:42",
        "db": "PACKETSTORM",
        "id": "78500"
      },
      {
        "date": "2010-06-26T00:55:26",
        "db": "PACKETSTORM",
        "id": "91054"
      },
      {
        "date": "2009-06-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200906-053"
      },
      {
        "date": "2009-06-04T16:30:00.297000",
        "db": "NVD",
        "id": "CVE-2009-1385"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2023-02-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-38831"
      },
      {
        "date": "2018-10-10T00:00:00",
        "db": "VULMON",
        "id": "CVE-2009-1385"
      },
      {
        "date": "2010-02-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-001876"
      },
      {
        "date": "2023-04-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200906-053"
      },
      {
        "date": "2024-11-21T01:02:21.347000",
        "db": "NVD",
        "id": "CVE-2009-1385"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200906-053"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Linux kernel of  e1000_clean_rx_irq Integer underflow vulnerability in functions",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001876"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "digital error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200906-053"
      }
    ],
    "trust": 0.6
  }
}
  fkie_cve-2009-1385
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea30e11970a96cfe5e32c03a29332554573b4a10 | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html | ||
| secalert@redhat.com | http://osvdb.org/54892 | ||
| secalert@redhat.com | http://secunia.com/advisories/35265 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/35566 | ||
| secalert@redhat.com | http://secunia.com/advisories/35623 | ||
| secalert@redhat.com | http://secunia.com/advisories/35656 | ||
| secalert@redhat.com | http://secunia.com/advisories/35847 | ||
| secalert@redhat.com | http://secunia.com/advisories/36051 | ||
| secalert@redhat.com | http://secunia.com/advisories/36131 | ||
| secalert@redhat.com | http://secunia.com/advisories/36327 | ||
| secalert@redhat.com | http://secunia.com/advisories/37471 | ||
| secalert@redhat.com | http://sourceforge.net/project/shownotes.php?release_id=504022&group_id=42302 | Patch | |
| secalert@redhat.com | http://wiki.rpath.com/Advisories:rPSA-2009-0111 | ||
| secalert@redhat.com | http://www.debian.org/security/2009/dsa-1844 | ||
| secalert@redhat.com | http://www.debian.org/security/2009/dsa-1865 | ||
| secalert@redhat.com | http://www.intel.com/support/network/sb/CS-030543.htm | ||
| secalert@redhat.com | http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc8 | Patch, Vendor Advisory | |
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2009:135 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2009:148 | ||
| secalert@redhat.com | http://www.openwall.com/lists/oss-security/2009/06/03/2 | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2009-1157.html | ||
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2009-1193.html | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/505254/100/0/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/507985/100/0/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/512019/100/0/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/35185 | ||
| secalert@redhat.com | http://www.ubuntu.com/usn/usn-793-1 | ||
| secalert@redhat.com | http://www.vmware.com/security/advisories/VMSA-2009-0016.html | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2009/3316 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=502981 | Exploit, Patch | |
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11598 | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11681 | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8340 | ||
| secalert@redhat.com | https://rhn.redhat.com/errata/RHSA-2009-1550.html | ||
| secalert@redhat.com | https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html | ||
| secalert@redhat.com | https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html | ||
| secalert@redhat.com | https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea30e11970a96cfe5e32c03a29332554573b4a10 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/54892 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35265 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35566 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35623 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35656 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35847 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36051 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36131 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36327 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/37471 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://sourceforge.net/project/shownotes.php?release_id=504022&group_id=42302 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://wiki.rpath.com/Advisories:rPSA-2009-0111 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2009/dsa-1844 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2009/dsa-1865 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.intel.com/support/network/sb/CS-030543.htm | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc8 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2009:135 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2009:148 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2009/06/03/2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2009-1157.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2009-1193.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/505254/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/507985/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/512019/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/35185 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-793-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2009-0016.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/3316 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=502981 | Exploit, Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11598 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11681 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8340 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://rhn.redhat.com/errata/RHSA-2009-1550.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html | 
| Vendor | Product | Version | |
|---|---|---|---|
| intel | e1000 | * | |
| intel | e1000 | 5.2.22 | |
| intel | e1000 | 5.2.30.1 | |
| intel | e1000 | 5.2.52 | |
| intel | e1000 | 5.3.19 | |
| intel | e1000 | 5.4.11 | |
| intel | e1000 | 5.5.4 | |
| intel | e1000 | 5.6.10 | |
| intel | e1000 | 5.6.10.1 | |
| intel | e1000 | 5.7.6 | |
| intel | e1000 | 6.0.54 | |
| intel | e1000 | 6.0.60 | |
| intel | e1000 | 6.1.16 | |
| intel | e1000 | 6.2.15 | |
| intel | e1000 | 6.3.9 | |
| intel | e1000 | 7.0.33 | |
| intel | e1000 | 7.0.41 | |
| intel | e1000 | 7.1.9 | |
| intel | e1000 | 7.2.7 | |
| intel | e1000 | 7.2.9 | |
| intel | e1000 | 7.3.15 | |
| intel | e1000 | 7.3.20 | |
| intel | e1000 | 7.4.27 | |
| linux | kernel | 2.6.24.7 | |
| linux | kernel | 2.6.25.15 | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | 2.2.27 | |
| linux | linux_kernel | 2.4.36 | |
| linux | linux_kernel | 2.4.36.1 | |
| linux | linux_kernel | 2.4.36.2 | |
| linux | linux_kernel | 2.4.36.3 | |
| linux | linux_kernel | 2.4.36.4 | |
| linux | linux_kernel | 2.4.36.5 | |
| linux | linux_kernel | 2.4.36.6 | |
| linux | linux_kernel | 2.6 | |
| linux | linux_kernel | 2.6.18 | |
| linux | linux_kernel | 2.6.18 | |
| linux | linux_kernel | 2.6.18 | |
| linux | linux_kernel | 2.6.18 | |
| linux | linux_kernel | 2.6.18 | |
| linux | linux_kernel | 2.6.18 | |
| linux | linux_kernel | 2.6.18 | |
| linux | linux_kernel | 2.6.18 | |
| linux | linux_kernel | 2.6.19.4 | |
| linux | linux_kernel | 2.6.19.5 | |
| linux | linux_kernel | 2.6.19.6 | |
| linux | linux_kernel | 2.6.19.7 | |
| linux | linux_kernel | 2.6.20.16 | |
| linux | linux_kernel | 2.6.20.17 | |
| linux | linux_kernel | 2.6.20.18 | |
| linux | linux_kernel | 2.6.20.19 | |
| linux | linux_kernel | 2.6.20.20 | |
| linux | linux_kernel | 2.6.20.21 | |
| linux | linux_kernel | 2.6.21.5 | |
| linux | linux_kernel | 2.6.21.6 | |
| linux | linux_kernel | 2.6.21.7 | |
| linux | linux_kernel | 2.6.22 | |
| linux | linux_kernel | 2.6.22.1 | |
| linux | linux_kernel | 2.6.22.2 | |
| linux | linux_kernel | 2.6.22.8 | |
| linux | linux_kernel | 2.6.22.9 | |
| linux | linux_kernel | 2.6.22.10 | |
| linux | linux_kernel | 2.6.22.11 | |
| linux | linux_kernel | 2.6.22.12 | |
| linux | linux_kernel | 2.6.22.13 | |
| linux | linux_kernel | 2.6.22.14 | |
| linux | linux_kernel | 2.6.22.15 | |
| linux | linux_kernel | 2.6.22.17 | |
| linux | linux_kernel | 2.6.22.18 | |
| linux | linux_kernel | 2.6.22.19 | |
| linux | linux_kernel | 2.6.22.20 | |
| linux | linux_kernel | 2.6.22.21 | |
| linux | linux_kernel | 2.6.22.22 | |
| linux | linux_kernel | 2.6.22_rc1 | |
| linux | linux_kernel | 2.6.22_rc7 | |
| linux | linux_kernel | 2.6.23 | |
| linux | linux_kernel | 2.6.23.8 | |
| linux | linux_kernel | 2.6.23.9 | |
| linux | linux_kernel | 2.6.23.10 | |
| linux | linux_kernel | 2.6.23.11 | |
| linux | linux_kernel | 2.6.23.12 | |
| linux | linux_kernel | 2.6.23.13 | |
| linux | linux_kernel | 2.6.23.15 | |
| linux | linux_kernel | 2.6.23.16 | |
| linux | linux_kernel | 2.6.23.17 | |
| linux | linux_kernel | 2.6.23_rc1 | |
| linux | linux_kernel | 2.6.24 | |
| linux | linux_kernel | 2.6.24.1 | |
| linux | linux_kernel | 2.6.24.2 | |
| linux | linux_kernel | 2.6.24.3 | |
| linux | linux_kernel | 2.6.24.4 | |
| linux | linux_kernel | 2.6.24.5 | |
| linux | linux_kernel | 2.6.24.6 | |
| linux | linux_kernel | 2.6.24_rc1 | |
| linux | linux_kernel | 2.6.24_rc4 | |
| linux | linux_kernel | 2.6.24_rc5 | |
| linux | linux_kernel | 2.6.25 | |
| linux | linux_kernel | 2.6.25 | |
| linux | linux_kernel | 2.6.25.1 | |
| linux | linux_kernel | 2.6.25.1 | |
| linux | linux_kernel | 2.6.25.2 | |
| linux | linux_kernel | 2.6.25.2 | |
| linux | linux_kernel | 2.6.25.3 | |
| linux | linux_kernel | 2.6.25.3 | |
| linux | linux_kernel | 2.6.25.4 | |
| linux | linux_kernel | 2.6.25.4 | |
| linux | linux_kernel | 2.6.25.5 | |
| linux | linux_kernel | 2.6.25.5 | |
| linux | linux_kernel | 2.6.25.6 | |
| linux | linux_kernel | 2.6.25.6 | |
| linux | linux_kernel | 2.6.25.7 | |
| linux | linux_kernel | 2.6.25.7 | |
| linux | linux_kernel | 2.6.25.8 | |
| linux | linux_kernel | 2.6.25.8 | |
| linux | linux_kernel | 2.6.25.9 | |
| linux | linux_kernel | 2.6.25.9 | |
| linux | linux_kernel | 2.6.25.10 | |
| linux | linux_kernel | 2.6.25.10 | |
| linux | linux_kernel | 2.6.25.11 | |
| linux | linux_kernel | 2.6.25.11 | |
| linux | linux_kernel | 2.6.25.12 | |
| linux | linux_kernel | 2.6.25.12 | |
| linux | linux_kernel | 2.6.25.13 | |
| linux | linux_kernel | 2.6.25.14 | |
| linux | linux_kernel | 2.6.25.16 | |
| linux | linux_kernel | 2.6.25.17 | |
| linux | linux_kernel | 2.6.26 | |
| linux | linux_kernel | 2.6.26.1 | |
| linux | linux_kernel | 2.6.26.2 | |
| linux | linux_kernel | 2.6.26.3 | |
| linux | linux_kernel | 2.6.26.4 | |
| linux | linux_kernel | 2.6.26.5 | |
| linux | linux_kernel | 2.6.27 | |
| linux | linux_kernel | 2.6.29 | |
| linux | linux_kernel | 2.6.29 | |
| linux | linux_kernel | 2.6.29 | |
| linux | linux_kernel | 2.6.29 | |
| linux | linux_kernel | 2.6.29 | |
| linux | linux_kernel | 2.6.29 | |
| linux | linux_kernel | 2.6.29.3 | |
| linux | linux_kernel | 2.6.29.rc1 | |
| linux | linux_kernel | 2.6.29.rc2 | |
| linux | linux_kernel | 2.6.29.rc2-git1 | |
| linux | linux_kernel | 2.6.30 | |
| linux | linux_kernel | 2.6.30 | |
| linux | linux_kernel | 2.6.30 | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:e1000:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D5A3319-0284-4AD3-90C1-51A5B1DEC589",
              "versionEndIncluding": "7.4.35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:e1000:5.2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8F900E9-03F9-4300-827C-30D5FCB05C4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:e1000:5.2.30.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4EDE6D-A095-48B3-BE17-E0E736875944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:e1000:5.2.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "931C9D7B-9E51-4D15-8B08-2AFDADAF938B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:e1000:5.3.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "47D7EBDF-CC20-4EAE-93A8-1F69EC3DFE75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:e1000:5.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7003DA69-4ACA-4C83-B223-021FE59FFB2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:e1000:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "44C0CB29-E22E-4866-A5FC-8BFF030451B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:e1000:5.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "895280E8-958D-4F03-865D-E7F9F11162E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:e1000:5.6.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2671C674-18DE-4A94-9E0D-C40CD3AE2141",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:e1000:5.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "818FDED7-7BB0-491E-856F-8795ABB683AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:e1000:6.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "33C7240F-6FB6-44A4-802B-81ECCE038312",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:e1000:6.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3A86028-EAB0-462D-97D4-9DF00148B4FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:e1000:6.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2451466-AB8B-4E64-B25B-CF7801B24F2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:e1000:6.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BBA12ED-F5FB-4CD0-A098-88DBCE2E11F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:e1000:6.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "62FC547B-9EE1-4A1E-969C-A8A3D0B487D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:e1000:7.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FC19339-25C7-4A88-BF12-194AA67E81A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:e1000:7.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "B878098A-958E-412C-BCB6-6F5BDBBBD5DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:e1000:7.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E25EC32-DF88-42AE-B36C-1B1CAC607EAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:e1000:7.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "799672BF-A7EC-426D-8A44-183312B962C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:e1000:7.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA010350-3589-44CA-867E-D709D2E044FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:e1000:7.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "72E2BF5D-283C-44DF-8044-B25AF793BDE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:e1000:7.3.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "38F81628-D03C-4646-8BD0-229DF0392E5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:e1000:7.4.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAE0F106-5017-4D0B-9824-53708D59D3C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linux:kernel:2.6.24.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1760FDC9-BB79-4299-8A6D-482085EE5BD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:linux:kernel:2.6.25.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "56EEB157-5037-4EAD-8625-35B91B167111",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B5B312F-E76A-43E1-A73F-31535848D55B",
              "versionEndIncluding": "2.6.28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:rc7-git6:*:*:*:*:*:*",
              "matchCriteriaId": "FBD48C54-738D-4559-A43C-A37F80CB5640",
              "versionEndIncluding": "2.6.30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "43F9DBB0-8AF7-42CA-95DD-68A344E9D549",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA39D4CE-22F0-46A2-B8CF-4599675E7D3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDD00664-A27C-4514-A2A4-079E8F9B0251",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E336C792-B7A1-4318-8050-DE9F03474CEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7228AE50-BACB-4AB8-9CE5-17DB0CD661AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6D260FD-E55E-4A95-AB7F-B880DBE37BAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E36D0159-1A05-4628-9C1C-360DED0F438C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E6654B9-42EB-4C2C-8F71-710D50556180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FC560CC-F785-42D5-A25B-1BA02E7AC464",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "C06F0037-DE20-4B4A-977F-BFCFAB026517",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1817C772-D367-4ABE-B835-466D31A6DC89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "C667B8E4-64EB-4A05-84FF-B2243DEF757D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "9484B41A-DFB6-4481-80D8-440C711CEA53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "53D373AF-DE6B-428E-9F0F-F1D220900A4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "F2975DF7-F916-456C-BF7C-2694559E5282",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*",
              "matchCriteriaId": "784EB96E-2FD3-4F77-8DB6-4D6C7A928946",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "86A98A70-51E3-4556-8DC4-DD09CF370D1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "469EE3B0-3CC2-4AC2-86A0-2DF34205E707",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCFECB2B-6482-45F2-B3BB-EDDEDA0948A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EC547EB-9308-4477-8256-A0E04B42D6DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F55A024-9F8E-44F8-A0D8-696BC232524A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "84595143-3B04-4CE8-81C0-28EEEC58CD0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "32EE2B49-DDEB-4B49-A5F0-CAA161095A5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3ABFA33-8FA1-488E-A9BD-1593F495F595",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "62F6DE3A-E6CC-4D7E-BD08-E43DC4182200",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9A29C44-EBE5-42B0-AFAD-C5A8F6EEF2F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A43C95-8569-40BE-9E5B-F9B3D0B9D188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD70B2B-9827-4DBB-B82D-0B70C2D4AB1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "99662904-E5E3-4E81-B199-39707EAEB652",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "615BDD1D-36AA-4976-909B-F0F66BF1090C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE8A26D6-1BDA-45F0-8F7C-F95986050E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "61A3EDF2-09D7-4116-AE46-D86E4B9602AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A55028-B8F9-4AD2-AE57-A80D561F3C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C4E641C-67D4-4599-8EFB-0B2F8D81D68C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "70460F6C-D6C0-4C1A-B13E-368705EAF223",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F26BA18-08AD-45FE-9F83-25CCB2E27270",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EBFF148-3EDA-4216-910B-8930D8C443C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "648C63F7-EA1D-4F2E-B8AF-1F380C83E542",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "1697B855-4834-4633-A5C8-C1F7F13ACE0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FBAE75F-9145-4B9A-A6D8-E488C5326145",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "5990C6C2-2F66-4C4D-8224-74163865F410",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A45A9B9-4B19-4A5B-BC95-BCBC4EF00F12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C23AD176-3B99-4593-BCBD-13C1E579A13E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "034DFD7F-8919-4245-8480-7B272F591271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CEBC606-6488-48CE-8AA8-5B8CC724D5D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "A83C60AF-50A9-480E-860D-45E80AC0A6B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "44FDF616-E410-4540-B377-98D1FB88CE35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.22_rc7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5313B736-9904-442A-84D6-8FC7B9AC2059",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE87D1BC-A72D-42D2-A93C-67A5823BEB14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AAC2E9D-0E82-4866-9046-ADD448418198",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "760FB32D-9795-4B29-B79A-A32B5E70F7EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DFF67E9-B0C2-48D5-BB3A-CF21D10010FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5881A78C-D162-4DE5-8353-2BB1EC1F428B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13D81D2-1A89-4E61-A90C-5E8BB880310B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F9887E-2466-4C73-A8E1-2117492F9EC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FDE5B27-2EF0-464E-8F14-5E809D84D389",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "815B2EE8-136F-44E4-997D-5F93A54775DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.23_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "76D0AFF0-8CA9-42EF-A20E-3CD6E7DDF016",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "13673DF5-09B1-40C8-AC54-A447DE8AB01E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "52152F5A-1833-4490-A373-9C547B90B0F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B64A095E-5E97-445E-B435-F09983CC0E7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8035F93-9DEE-4B92-ABAA-4ABE0B71BF41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EE92406-DBF3-463E-8A51-F9679E851FDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C60D19B-ED9B-443C-9D49-002ABD381119",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "264C61EE-64F6-43AD-B54F-7D683C29E64F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3069324C-28FB-4BB6-9451-F3AC6A8DA64C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24_rc4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F3D19AD-4268-45E7-B13D-BC93ABDF2226",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.24_rc5:*:*:*:*:*:*:*",
              "matchCriteriaId": "67E619E6-A515-43BC-B371-C1FF6DAA6CCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "71295664-89EC-4BB3-9F86-B1DDA20FAC5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "6ED1BAE4-A6D3-49A1-BCAD-1E514D42F609",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "37BE853A-BA6F-4A70-B166-E34441F0B7DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "4F7C4DFF-616C-497D-9BAB-67C2E21BC21D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "85064FDF-4B62-43BF-B36C-F659D739BC22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "E6EBBFE8-2332-45CE-93F8-6815C2AE5D17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEADC505-FF44-4D45-8EA6-B23A1C4564D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "388414A1-C9B4-41BA-AD35-6501A463A095",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CE3C807-5C9B-4B71-868B-DF17ECB1514F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "FDBA01DD-C129-48F1-800B-838418F4A4A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6CADAA2-91D2-40C4-90F3-D7F40A3D4CB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "185F1EF8-04EB-43ED-B909-8BDF60F23E76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "45B6847C-873B-4BE1-852D-239115E59BA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "D9D4BCAD-B3CD-4FA1-A833-0D7D40289E07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF41209E-D27F-4642-A405-90E822A41897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "3483FAFA-353C-498F-AF68-8F5B84A0F30D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "97F59FD9-46E5-4F63-80A0-091AD44D1867",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "B3D5AEA5-210B-4E9F-8D9C-C25B84F15C75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "428844A5-E020-4AE9-8012-9AEDFCB7C32E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "6B11A9E1-9D90-46DC-81B5-17A137205AB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "94C9D70D-A552-48D6-9497-EE07EB5649D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "07EEC559-9240-46BE-9057-0F17D1F61F99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF6169FF-9FF9-4A81-BAEB-6D5132F64F61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "BBBC127F-D67E-43FE-BCFE-606C200084F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6DC79CF-A504-4232-9F66-B5DCD0213DA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "42B18945-EE09-4E6B-8C11-E382E5F8F850",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "192B4273-0935-4232-BBFD-A850855CAC5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "60E9FDA8-7EC3-4B9B-B508-27F948D60DDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "A16F2182-C489-4CA9-A56B-01463148D16F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "630A56D3-7A82-44DE-8888-2EB8CD1C24A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E45F4429-5A9C-4E8B-96EE-CCF19776CABF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EFCAF09-BB20-424C-8648-014C0F71F8A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A74970C-5EEA-47A7-A62D-AF98F4D1228F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEA56669-B09E-42C2-9591-245C46909A2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B33D60-8023-4A0B-ACF7-9F811EEB8BCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D08D180-23F7-456F-98CA-26B53C678D76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "856FE78A-29B5-4411-98A0-4B0281C17EB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "C386B13F-9D7C-45F8-B86A-886384144A8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29:git1:*:*:*:*:*:*",
              "matchCriteriaId": "32F95AB2-319C-4BDE-8D34-9FBE69A2FB6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D48FD9D7-E775-4E26-AEBF-01A09C404D6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "89EA3CF3-0AB7-4648-96BA-25E978D2C8C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc2_git7:*:*:*:*:*:*",
              "matchCriteriaId": "3E4DB179-F78F-4D36-A47D-557FB1B945DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc8-kk:*:*:*:*:*:*",
              "matchCriteriaId": "23859759-4748-4A03-9D78-083C77CFF4AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A701E87D-B807-426E-9CD4-6721DBCABE19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D5FC0A9-A78A-4D09-BDCC-208AFC899824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DBFC9DD-B7C2-4FB2-A8F6-29FF50EFAAE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.29.rc2-git1:*:*:*:*:*:*:*",
              "matchCriteriaId": "54B3BFC1-4B0A-4D63-BFA2-CF6A51A8D2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "45273823-29EA-44DE-8444-3933402C5793",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "88F60E74-09DB-4D4A-B922-4A46EED0EC20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E242D3DE-D1DC-406A-BCC3-C4380B7EC369",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size."
    },
    {
      "lang": "es",
      "value": "Desbordamiento inferior de entero en la funci\u00f3n 1000_clean_rx_irq en drivers/net/e1000/e1000_main.c en el controlador e1000 en Linux kernel anterior a v2.6.30-rc8, el controlador e1000e en el kernel de Linux, y Intel Wired Ethernet (tambi\u00e9n conocido como e1000) anteriores a v7.5.5 permite a los atacantes remotos causar una denegaci\u00f3n de servicios (panic) a trav\u00e9s de un tama\u00f1o de marco manipulado."
    }
  ],
  "id": "CVE-2009-1385",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-06-04T16:30:00.297",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea30e11970a96cfe5e32c03a29332554573b4a10"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/54892"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35265"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/35566"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/35623"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/35656"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/35847"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/36051"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/36131"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/36327"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/37471"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://sourceforge.net/project/shownotes.php?release_id=504022\u0026group_id=42302"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0111"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2009/dsa-1844"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2009/dsa-1865"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.intel.com/support/network/sb/CS-030543.htm"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc8"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:135"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:148"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2009/06/03/2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1157.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1193.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/505254/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/512019/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/35185"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/usn-793-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2009/3316"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11598"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11681"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8340"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://rhn.redhat.com/errata/RHSA-2009-1550.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea30e11970a96cfe5e32c03a29332554573b4a10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/54892"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35265"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/35566"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/35623"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/35656"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/35847"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/36051"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/36131"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/36327"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/37471"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://sourceforge.net/project/shownotes.php?release_id=504022\u0026group_id=42302"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0111"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1844"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1865"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.intel.com/support/network/sb/CS-030543.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:135"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:148"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2009/06/03/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1157.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-1193.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/505254/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/512019/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/35185"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-793-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2009/3316"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11598"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11681"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8340"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://rhn.redhat.com/errata/RHSA-2009-1550.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  gsd-2009-1385
Vulnerability from gsd
{
  "GSD": {
    "alias": "CVE-2009-1385",
    "description": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
    "id": "GSD-2009-1385",
    "references": [
      "https://www.suse.com/security/cve/CVE-2009-1385.html",
      "https://www.debian.org/security/2009/dsa-1865",
      "https://www.debian.org/security/2009/dsa-1844",
      "https://access.redhat.com/errata/RHSA-2010:0079",
      "https://access.redhat.com/errata/RHSA-2009:1550",
      "https://access.redhat.com/errata/RHSA-2009:1193",
      "https://access.redhat.com/errata/RHSA-2009:1157",
      "https://access.redhat.com/errata/RHSA-2009:1132",
      "https://linux.oracle.com/cve/CVE-2009-1385.html"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2009-1385"
      ],
      "details": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
      "id": "GSD-2009-1385",
      "modified": "2023-12-13T01:19:48.104574Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "secalert@redhat.com",
        "ID": "CVE-2009-1385",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "=",
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "http://www.securityfocus.com/archive/1/507985/100/0/threaded",
            "refsource": "MISC",
            "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
          },
          {
            "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
            "refsource": "MISC",
            "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
          },
          {
            "name": "http://www.vupen.com/english/advisories/2009/3316",
            "refsource": "MISC",
            "url": "http://www.vupen.com/english/advisories/2009/3316"
          },
          {
            "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea30e11970a96cfe5e32c03a29332554573b4a10",
            "refsource": "MISC",
            "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea30e11970a96cfe5e32c03a29332554573b4a10"
          },
          {
            "name": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html",
            "refsource": "MISC",
            "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html"
          },
          {
            "name": "http://osvdb.org/54892",
            "refsource": "MISC",
            "url": "http://osvdb.org/54892"
          },
          {
            "name": "http://secunia.com/advisories/35265",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/35265"
          },
          {
            "name": "http://secunia.com/advisories/35566",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/35566"
          },
          {
            "name": "http://secunia.com/advisories/35623",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/35623"
          },
          {
            "name": "http://secunia.com/advisories/35656",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/35656"
          },
          {
            "name": "http://secunia.com/advisories/35847",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/35847"
          },
          {
            "name": "http://secunia.com/advisories/36051",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/36051"
          },
          {
            "name": "http://secunia.com/advisories/36131",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/36131"
          },
          {
            "name": "http://secunia.com/advisories/36327",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/36327"
          },
          {
            "name": "http://secunia.com/advisories/37471",
            "refsource": "MISC",
            "url": "http://secunia.com/advisories/37471"
          },
          {
            "name": "http://sourceforge.net/project/shownotes.php?release_id=504022\u0026group_id=42302",
            "refsource": "MISC",
            "url": "http://sourceforge.net/project/shownotes.php?release_id=504022\u0026group_id=42302"
          },
          {
            "name": "http://wiki.rpath.com/Advisories:rPSA-2009-0111",
            "refsource": "MISC",
            "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0111"
          },
          {
            "name": "http://www.debian.org/security/2009/dsa-1844",
            "refsource": "MISC",
            "url": "http://www.debian.org/security/2009/dsa-1844"
          },
          {
            "name": "http://www.debian.org/security/2009/dsa-1865",
            "refsource": "MISC",
            "url": "http://www.debian.org/security/2009/dsa-1865"
          },
          {
            "name": "http://www.intel.com/support/network/sb/CS-030543.htm",
            "refsource": "MISC",
            "url": "http://www.intel.com/support/network/sb/CS-030543.htm"
          },
          {
            "name": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc8",
            "refsource": "MISC",
            "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc8"
          },
          {
            "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:135",
            "refsource": "MISC",
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:135"
          },
          {
            "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:148",
            "refsource": "MISC",
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:148"
          },
          {
            "name": "http://www.openwall.com/lists/oss-security/2009/06/03/2",
            "refsource": "MISC",
            "url": "http://www.openwall.com/lists/oss-security/2009/06/03/2"
          },
          {
            "name": "http://www.redhat.com/support/errata/RHSA-2009-1157.html",
            "refsource": "MISC",
            "url": "http://www.redhat.com/support/errata/RHSA-2009-1157.html"
          },
          {
            "name": "http://www.redhat.com/support/errata/RHSA-2009-1193.html",
            "refsource": "MISC",
            "url": "http://www.redhat.com/support/errata/RHSA-2009-1193.html"
          },
          {
            "name": "http://www.securityfocus.com/archive/1/505254/100/0/threaded",
            "refsource": "MISC",
            "url": "http://www.securityfocus.com/archive/1/505254/100/0/threaded"
          },
          {
            "name": "http://www.securityfocus.com/archive/1/512019/100/0/threaded",
            "refsource": "MISC",
            "url": "http://www.securityfocus.com/archive/1/512019/100/0/threaded"
          },
          {
            "name": "http://www.securityfocus.com/bid/35185",
            "refsource": "MISC",
            "url": "http://www.securityfocus.com/bid/35185"
          },
          {
            "name": "http://www.ubuntu.com/usn/usn-793-1",
            "refsource": "MISC",
            "url": "http://www.ubuntu.com/usn/usn-793-1"
          },
          {
            "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11598",
            "refsource": "MISC",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11598"
          },
          {
            "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11681",
            "refsource": "MISC",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11681"
          },
          {
            "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8340",
            "refsource": "MISC",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8340"
          },
          {
            "name": "https://rhn.redhat.com/errata/RHSA-2009-1550.html",
            "refsource": "MISC",
            "url": "https://rhn.redhat.com/errata/RHSA-2009-1550.html"
          },
          {
            "name": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html",
            "refsource": "MISC",
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html"
          },
          {
            "name": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html",
            "refsource": "MISC",
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html"
          },
          {
            "name": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html",
            "refsource": "MISC",
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html"
          },
          {
            "name": "https://bugzilla.redhat.com/show_bug.cgi?id=502981",
            "refsource": "MISC",
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:x86_64:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:x86_64:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc8-kk:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:x86_64:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.15:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:intel:e1000:5.5.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.6.28",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.21:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:x86_64:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:intel:e1000:5.4.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:x86_64:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:intel:e1000:7.3.15:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:x86_64:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc3:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:intel:e1000:7.0.41:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.16:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:x86_64:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:intel:e1000:7.4.27:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.16:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:intel:e1000:5.6.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.21:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:x86_64:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:intel:e1000:6.3.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:intel:e1000:5.6.10.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24_rc4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.15:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:intel:e1000:7.0.33:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.18:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.18:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:x86_64:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:x86_64:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:intel:e1000:7.3.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:intel:e1000:5.2.30.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.16:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:intel:e1000:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "7.4.35",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:intel:e1000:5.7.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:intel:e1000:5.3.19:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24_rc1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.19:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:intel:e1000:7.2.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:rc7-git6:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.6.30",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:linux:kernel:2.6.24.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:intel:e1000:6.0.54:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:intel:e1000:6.1.16:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:intel:e1000:6.2.15:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc2_git7:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:x86_64:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23_rc1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.22:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29.rc1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:x86_64:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22_rc7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24_rc5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:linux:kernel:2.6.25.15:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:intel:e1000:5.2.52:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.36.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:intel:e1000:5.2.22:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:intel:e1000:7.1.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29.rc2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.19:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.24.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22_rc1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29.rc2-git1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.14:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.30:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.26.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.29:git1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:intel:e1000:7.2.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:intel:e1000:6.0.60:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.23.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.22.14:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.25.10:*:x86_64:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2009-1385"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-189"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://sourceforge.net/project/shownotes.php?release_id=504022\u0026group_id=42302",
              "refsource": "CONFIRM",
              "tags": [
                "Patch"
              ],
              "url": "http://sourceforge.net/project/shownotes.php?release_id=504022\u0026group_id=42302"
            },
            {
              "name": "35265",
              "refsource": "SECUNIA",
              "tags": [
                "Vendor Advisory"
              ],
              "url": "http://secunia.com/advisories/35265"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=502981",
              "refsource": "CONFIRM",
              "tags": [
                "Exploit",
                "Patch"
              ],
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
            },
            {
              "name": "35185",
              "refsource": "BID",
              "tags": [],
              "url": "http://www.securityfocus.com/bid/35185"
            },
            {
              "name": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc8",
              "refsource": "CONFIRM",
              "tags": [
                "Patch",
                "Vendor Advisory"
              ],
              "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.30-rc8"
            },
            {
              "name": "[oss-security] 20090603 CVE-2009-1385 kernel: e1000_clean_rx_irq() denial of service",
              "refsource": "MLIST",
              "tags": [],
              "url": "http://www.openwall.com/lists/oss-security/2009/06/03/2"
            },
            {
              "name": "54892",
              "refsource": "OSVDB",
              "tags": [],
              "url": "http://osvdb.org/54892"
            },
            {
              "name": "MDVSA-2009:135",
              "refsource": "MANDRIVA",
              "tags": [],
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:135"
            },
            {
              "name": "FEDORA-2009-6883",
              "refsource": "FEDORA",
              "tags": [],
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01048.html"
            },
            {
              "name": "FEDORA-2009-6768",
              "refsource": "FEDORA",
              "tags": [],
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01094.html"
            },
            {
              "name": "FEDORA-2009-6846",
              "refsource": "FEDORA",
              "tags": [],
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01193.html"
            },
            {
              "name": "http://www.intel.com/support/network/sb/CS-030543.htm",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "http://www.intel.com/support/network/sb/CS-030543.htm"
            },
            {
              "name": "35566",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/35566"
            },
            {
              "name": "35623",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/35623"
            },
            {
              "name": "RHSA-2009:1157",
              "refsource": "REDHAT",
              "tags": [],
              "url": "http://www.redhat.com/support/errata/RHSA-2009-1157.html"
            },
            {
              "name": "MDVSA-2009:148",
              "refsource": "MANDRIVA",
              "tags": [],
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:148"
            },
            {
              "name": "SUSE-SA:2009:038",
              "refsource": "SUSE",
              "tags": [],
              "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html"
            },
            {
              "name": "DSA-1844",
              "refsource": "DEBIAN",
              "tags": [],
              "url": "http://www.debian.org/security/2009/dsa-1844"
            },
            {
              "name": "36051",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/36051"
            },
            {
              "name": "http://wiki.rpath.com/Advisories:rPSA-2009-0111",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0111"
            },
            {
              "name": "36131",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/36131"
            },
            {
              "name": "35847",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/35847"
            },
            {
              "name": "RHSA-2009:1193",
              "refsource": "REDHAT",
              "tags": [],
              "url": "http://www.redhat.com/support/errata/RHSA-2009-1193.html"
            },
            {
              "name": "36327",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/36327"
            },
            {
              "name": "DSA-1865",
              "refsource": "DEBIAN",
              "tags": [],
              "url": "http://www.debian.org/security/2009/dsa-1865"
            },
            {
              "name": "RHSA-2009:1550",
              "refsource": "REDHAT",
              "tags": [],
              "url": "https://rhn.redhat.com/errata/RHSA-2009-1550.html"
            },
            {
              "name": "ADV-2009-3316",
              "refsource": "VUPEN",
              "tags": [],
              "url": "http://www.vupen.com/english/advisories/2009/3316"
            },
            {
              "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
            },
            {
              "name": "37471",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/37471"
            },
            {
              "name": "USN-793-1",
              "refsource": "UBUNTU",
              "tags": [],
              "url": "http://www.ubuntu.com/usn/usn-793-1"
            },
            {
              "name": "35656",
              "refsource": "SECUNIA",
              "tags": [],
              "url": "http://secunia.com/advisories/35656"
            },
            {
              "name": "oval:org.mitre.oval:def:8340",
              "refsource": "OVAL",
              "tags": [],
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8340"
            },
            {
              "name": "oval:org.mitre.oval:def:11681",
              "refsource": "OVAL",
              "tags": [],
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11681"
            },
            {
              "name": "oval:org.mitre.oval:def:11598",
              "refsource": "OVAL",
              "tags": [],
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11598"
            },
            {
              "name": "20100625 VMSA-2010-0010 ESX 3.5 third party update for Service Console kernel",
              "refsource": "BUGTRAQ",
              "tags": [],
              "url": "http://www.securityfocus.com/archive/1/512019/100/0/threaded"
            },
            {
              "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
              "refsource": "BUGTRAQ",
              "tags": [],
              "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
            },
            {
              "name": "20090724 rPSA-2009-0111-1 kernel",
              "refsource": "BUGTRAQ",
              "tags": [],
              "url": "http://www.securityfocus.com/archive/1/505254/100/0/threaded"
            },
            {
              "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea30e11970a96cfe5e32c03a29332554573b4a10",
              "refsource": "MISC",
              "tags": [],
              "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea30e11970a96cfe5e32c03a29332554573b4a10"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "acInsufInfo": false,
          "cvssV2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "exploitabilityScore": 10.0,
          "impactScore": 6.9,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "HIGH",
          "userInteractionRequired": false
        }
      },
      "lastModifiedDate": "2023-02-13T02:20Z",
      "publishedDate": "2009-06-04T16:30Z"
    }
  }
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
 - Confirmed: The vulnerability is confirmed from an analyst perspective.
 - Published Proof of Concept: A public proof of concept is available for this vulnerability.
 - Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
 - Patched: This vulnerability was successfully patched by the user reporting the sighting.
 - Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
 - Not confirmed: The user expresses doubt about the veracity of the vulnerability.
 - Not patched: This vulnerability was not successfully patched by the user reporting the sighting.